Fungame Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan has already got out of circulation and most of modern antiviral computers area able to recognize it, Fungame Trojan is still a threat for those, who have no reliable defence installed on their PCs. By making many harmful actions on the infected machine, this spyware is usually a reason of different serious problems, that's why it should be treated carefully. The following files were created in the system:

GameServer 1.0b

Posted: March 28, 2006 | Category: Trojans
This application is an utility, used by many hackers for controlling many backdoor applications on a victim PC. With the help of GameServer The following files were created in the system:

Gasija Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware usually tries to sneak silently into a victim PC and start carrying its destructive actions. These actions are usually able to become a real problem to the user, that's why removing this trojan as soon as possible would be a wise decision. The following files were created in the system:

Gast Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is usually able to make a set of many serious problems to the user of the infected machine. By running silently in background, Gast Trojan searches for many types of files and removes them; this technique is always a potent threat to the stability of any computer, that's why it's strongly recommended to remove this pest from the infected machine as soon as possible. The following files were created in the system:

GDE Trojan

Posted: March 28, 2006 | Category: Trojans
This old trojan is almost harmless, but still it is able to make some annoying problems to the user of the infected computer. GDE Trojan usually shows a set of many messages with annoying content. This pest is also able to halt the infected PC; this may cause the loss of some important data. The following files were created in the system:

LinkMaker

Posted: March 28, 2006 | Category: Adware
LinkMaker is an illegal advertising application, which sends a web browser to a predefined commercial web site. It also downloads and installs third-party adware softwares. LinkMaker doesn't spread and must be manually installed. It may get into the computer along with some ad-supported software.

Paq Keylog

Posted: March 28, 2006 | Category: Trojans
Paq Keylog is made by PAQTOOL.COM. It is not a spyware. Paq Keylog must be manually installed and has the uninstaller. However, it can be used by hackers to violate your privacy. Paq Keylog automatically runs on every Windows startup, secretly works in background and records all user keystrokes.

MegaSearch

Posted: March 28, 2006 | Category: Adware
MegaSearch is an additional Internet Explorer toolbar that changes default search page and tracks user activity in the Internet. The spyware sends gathered data to a predefined web site. MegaSearch doesn't spread and must be manually installed.

FastFinder Toolbar

Posted: March 28, 2006 | Category: Browser Helper Object
Fast Finder Toolbar is a third-party Internet Explorer plugin that may show commercial advertisements and send a user to certain web sites. It also may download and install adware applications. This risk must be manually installed. Fast Finder Toolbar runs on every Windows startup.

Activity Keylogger

Posted: March 28, 2006 | Category: Keyloggers
Activity Keylogger is not an actual spyware, but a legitimate commercial product. However, it can be used for obvious malicious purposes. Activity Keylogger records keystrokes, takes screenshots, tracks user activity in the Internet and logs chat conversations. It sends gathered data to a predefined e-mail address. Activity Keylogger must be manually installed and comes with the uninstaller. It runs on every Windows startup.

Genesis Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is always able to become a reason of many problems for those, who have no good and reliable defence installed on their PCs. By running in background of the infected computer, this spyware is invisible for inexperienced users; this technique makes it easier for this pest to perform its destructive actions. The following files were created in the system:

Get Admin Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which usually sneaks silently into infected PC via many Internet resources and gives the control over this PC to the hacker. The hacker gets a possibility of stealing different personal pieces of data or harming the infected computer. It is always a wise choice to keep your antiviral databases updated in order to prevent this spyware from infecting your computer. The following files were created in the system:

Getit753.com Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is quite old and several types of modern computers are unsuitable for its activities, it's still a potential threat for those users, who have no reliable security computer installed on their PCs. By infecting many files Getit753.com Trojan usually makes the infected computer to work in unstable way. The following files were created in the system:

GetMac Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan was created with one specific purpose. GetMac infects the computer and sends information about its MAC to the specific location on the Internet. This action doesn’t usually bring any real harm to most of users, but still it may be a threat to computers security. The following files were created in the system:

GetScreen Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is able to become a real threat to the security of the infected machine. By running in background of the computer, it takes screenshots of user's activity and sends them to the specified address. This technique is able to become a reason of many problems, that's why it's strongly recommended to remove this trojan as soon as possible. The following files were created in the system:

2Search

Posted: March 28, 2006 | Category: Adware
2Search is an adware spyware that monitors user activity in the Internet, logs visited web sites and shows addresses of similar Internet resources. 2Search can get into the computer along with some ad-supported software. 2Search also can be manually installed. 2Search spyware runs on every Windows startup. 2Search comes with the uninstaller.

TrustyHound

Posted: March 28, 2006 | Category: Spyware
TrustyHound malware provides a search engine in the system tray, collects computer information, and sends it to a remote server. TrustyHound spyware doesn't distribute itself and must be manually installed. TrustyHound comes with working uninstaller. TrustyHound may also create a lot of desktop and start menu links to certain Internet sites.

KGB Spy

Posted: March 28, 2006 | Category: Spyware
KGB Spy is a commercial keylogger that tracks user activity, records all keystrokes and takes screenshots. Gathered data can be sent to a configurable e-mail address or uploaded to a predefined FTP server. KGB Spy must be manually installed. The keylogger runs on every Windows startup. It comes with the functional uninstaller.

MessageSpy

Posted: March 28, 2006 | Category: Keyloggers
MessageSpy is a relatively simple commercial malware application designed to record online chat conversations. It is compatible only with AOL Instant Messenger and doesn't have additional functionality. Message Spy must be manually installed.

WebPI

Posted: March 28, 2006 | Category: Keyloggers
WebPI is a commercial keylogger that records all user keystrokes and captures screenshots. Logged data is saved on a hard disk. WebPI is not an actual spyware, but can be easily used for malicious purposes. The application must be manually installed. It runs on every Windows startup.