Fight Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan, which was originated in 2004, is quite a big threat for everyone, who has no reliable defence installed on his or her computer. Although this spyware has already got out of circulation, it is still possible to get infected with it and feel its destructive power. The following files were created in the system:

FileHider Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is quite harmless for the infected computer, although its behaviour may cause several annoying consequences. FileHider Trojan usually writes itself to the end of COM-files and perform several other actions, which may cause unstable computer working. On each Friday this pest hides one of the files in the current directory. The following files were created in the system:

BAT.126

Posted: March 28, 2006 | Category: Trojans
This trojan is a member of BAT-trojans' family. This means that BAT.126 usually deals with many BAT-files by infecting them with its code. This technique makes it quite difficult to remove this infection totally and makes a lot of problem to the infected computer. Among possible effects of the activity of this trojan are: computer instability, the loss of performance, computer crashes, etc. The following files were created in the system:

FireCracker Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is especially dangerous for those users, who have many firewalls installed on their PCs. FireCracker searches for firewalls and tries to remove them from the infected computer. Most users don't usually notice the loss of their firewalls, because an icon in the taskbar is still present after the removal. This may lead to many problems, such as getting infected with other spywares. The following files were created in the system:

FirstCash Websearch

Posted: March 28, 2006 | Category: Adware
FirstCash Websearch is a parasitic adware application, which shows unwanted advertisements in your web browser or within its host software. It can be secretly installed by some ad-supported software or malicious web sites. The following CLSID's were detected: HKEY..\..\ {CLSID Path} 6a85d97d-665d-4825-8341-9501ad9f56a3

HighTraffic

Posted: March 28, 2006 | Category: Adware
HighTraffic is a parasitic adware application, which shows unwanted advertisements in your web browser or within its host software. It can be secretly installed by some ad-supported software or malicious web sites.

INetSpeak.eBoom

Posted: March 28, 2006 | Category: Adware
INetSpeak.eBoom is a parasitic adware application, which shows unwanted advertisements in your web browser or within its host software. It can be secretly installed by some ad-supported software or malicious web sites.

Memory Watcher

Posted: March 28, 2006 | Category: Trojans
Memory Watcher is a parasitic adware application, which shows unwanted advertisements in your web browser or within its host software. It can be secretly installed by some ad-supported software or malicious web sites.

PowerReg Scheduler

Posted: March 28, 2006 | Category: Trojans
It is an adware spyware designed to serve undesirable commercial advertisements to user desktop using a web browser or installed ad-supported software. It also may have additional functionality specific to some variants of browser hijackers and malware applications. PowerReg Scheduler strives to hide from the user and make its detection difficult.

TheLocalSearch

Posted: March 28, 2006 | Category: Bad Toolbars
TheLocalSearch is a parasitic adware application, which shows unwanted advertisements in your web browser or within its host software. It can be secretly installed by some ad-supported software or malicious web sites.

Memo Trojan

Posted: March 28, 2006 | Category: Trojans
Memo trojan is a dangerous spyware, which usually infects the computer from many internet resources . This pest is able to bring a lot of damage , that's why it's tremendously important to protect your computer from getting infected by keeping your antiviral computer up-to-date. The following files were created in the system:

Fixit Trojan

Posted: March 28, 2006 | Category: Trojans
As many other Trojan Horses do, this spyware usually sneaks silently into the computer with no reliable protection and gives a partial control over this computer to the hacker. He or she is able to modify many computer settings, handle files and access private information sources . It is always recommended to have a good defence installed on you PC in order to prevent this infection. The following files were created in the system:

Flask MPEG 0563 Trojan

Posted: March 28, 2006 | Category: Trojans
This application is a trojan, which means that it has a hidden intent. Flask MPEG 0563 is able to make some serious problems to the user of the infected machine; these problems vary from different computer changes to the loss of private data. It's always recommended to complete a full computer scan with your antiviral computer if you believe your PC may be infected with such trojan. The following files were created in the system:

Flood Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually infects a computer through the IRC channels, after a user follows a suspicious link or accepts many DCC file transfer proposals. Flood Trojan can bring to the user a lot of problems, such as IRC instability or many changes in the infected computer. The following files were created in the system:

FloodDisk Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually carries a lot of destructive actions to the infected computer. This spyware's activities may lead to many negative consequences, such as computer instability or loss of important data. If no actions against it are taken immediately, FloodDisk may lead to even more dangerous effects, that's why it's recommended to remove it from the infected machine as soon as possible. The following files were created in the system:

FloodMem Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan; this means it concentrates on damaging one particular PC by changing many settings and damaging files . If no actions against this spyware are taken immediately after the infection, some more critical problems may occur. The following files were created in the system:

WhistleSoftware

Posted: March 28, 2006 | Category: Trojans
WhistleSoftware is a typical adware application that shows annoying advertisements without asking for user permission. It can be installed by unsafe web sites or ad-supported software. The infection symptoms are constantly appearing pop-ups or web browser windows containing commercial advertisements. WhistleSoftware also may modify some computer settings and violate user privacy.

INetSpeak.Iexplorr

Posted: March 28, 2006 | Category: Adware
It is a spyware that belongs to the adware category. INetSpeak.Iexplorr serves potentially unwanted commercial advertisements within your web browser or installed ad-supported application. This adware secretly works in background and may perform additional harmful actions - track your activity in the Internet or alter browser configuration. INetSpeak.Iexplorr may violate your privacy and affect your PC.

Snines

Posted: March 28, 2006 | Category: Trojans
Snines is a trojan that collects information about the compromised computer and registers the user to Japanese porn service without asking for his permission. The following files were created in the system:

Format CQ

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a BAT-trojan, which means it usually infects the computer as a batch-file and deals with other files of this type. One of the most dangerous actions, available to Format CQ, is its attempt to format the hard drive of the infected computer. In case of successful format, all data on the drive will be lost. The following files were created in the system: