Happas Trojan

Posted: March 28, 2006 | Category: Trojans
Happas Trojan usually tries to sneak into the target computer via many Internet resources, such as suspicious web pages or e-mail messages from unknown senders. Although most of modern antiviral computers can recognize and remove this pest, it's still a threat for those, who have no good defence against such spywares. The following files were created in the system:

Parkin Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is absolutely harmless. Parkin Trojan shows a friendly message on a screen and, in some certain circumstances, fakes many destructive actions. Although there's no need to worry about negative effects, it's still recommended to remove this joke, because its actions may sometimes seem annoying. The following files were created in the system:

HD-Crypt Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan may sneak into the computer from many suspicious Internet resources . Once run on the infected machine, HD-Crypt Trojan starts performing its destructive actions, which can lead to some serious consequences . The following files were created in the system:

HDFill Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is quite old and many modern computers are immune from its actions, there still are several late versions, which may make a lot of difficulties to everybody, who has no good defence installed on his or her machine. By changing sizes of many files, this spyware fills the hard disk; this technique always lead to negative effects, such as loss of performance or unstable computer working. The following files were created in the system:

HDOpt trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which means it doesn't strive to make as many copies of it as possible to many addresses. It simply concentrates on damaging one particular machine by performing different destructive actions. These actions may seriously damage the hard disk of the infected machine, that's why it's tremendously important to detect and remove this spyware from the computer as soon as possible. The following files were created in the system:

Look2Me

Posted: March 28, 2006 | Category: Spyware
Look2Me is a malicious spyware that tracks user Internet activity, logs web sites visited, user actions taken and sends gathered information to a predetermined remote server. Look2Me also secretly downloads from the Internet and installs other malware and adware threats. Look2Me injects malicious code to the Windows Explorer process and other active tasks in order to complicate its removal. Look2Me spyware is able to silently update itself via the Internet. It automatically runs on every...

ActMon

Posted: March 28, 2006 | Category: Keyloggers
ActMon is a PC monitoring application that tracks user activity, logs all keystrokes, takes screenshots, captures online chat conversations and e-mail messages, records login names, passwords and addresses of visited web sites. Gathered data can be sent to a configurable e-mail address or transferred to a predefined remote host. ActMon is able to hide its running processes. The threat must be manually installed. It automatically runs on every Windows startup.

ZenoSearch

Posted: March 28, 2006 | Category: Adware
ZenoSearch, also known as Zeno Browser Enhancer, is an adware application that shows undesirable commercial pop-up advertisements based on keywords that the user enters into popular Internet search engines such as Google, Yahoo, MSN, Lycos and others. The threat doesn't carry any destructive payload. ZenoSearch must be manually installed. It automatically runs on every Windows startup.

Trafficadvance

Posted: March 28, 2006 | Category: Dialers
Trafficadvance is an Italian porn dialer program. Once installed, Trafficadvance will attempt to connect to an extremely expensive international phone number, using your computers modem, and will then download pornographic content. Trafficadvance is also known as Dialer.NetVision.

Webext

Posted: March 28, 2006 | Category: Browser Helper Object
Webext is an adware application, which shows unsolicited commercial pop-up advertisements based on keywords that it detects in the text, which the user enters into the web browser's windows. The threat regularly contacts a predetermined remote server in order to update its configuration settings. Webext must be manually installed. It works as an Internet Explorer add-on and therefore runs every time the user launches the web browser.

Headless Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan, which was created in 1996, is quite old and harmless for many modern computers, users of old machines can never feel safe and protected from Headless Trojan if their machines have no good antiviral computers installed. By performing many harmful actions, this spyware may seriously damage some critical computer components . The following files were created in the system:

Hellfire Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after first symptoms of infection, it may produce a wide variety of problems. Some of these problems may become critical, cause many computer errors and make the whole computer work in unstable way. It is always a best decision to have your antiviral definitions up-to-date in order to prevent infection. The following files were created in the system:

Helloween.1376

Posted: March 28, 2006 | Category: Trojans
This spyware is almost harmless, though sometimes it may be annoying. Helloween.1376 infects many *.COM and *.EXE files with 1376 bytes of hostile code, which is executed every time when an infected file is run. On the 1st of November this pest usually shows an annoying message, which also brings no harm for the computer. The following files were created in the system:

Herms Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which usually sneaks into the computer via many Internet resources and starts its destructive activities. These activities usually bring a lot of problems to the user, that's why it's always recommended to have your antiviral application updated in order to prevent Herms Trojan from infecting your PC. The following files were created in the system:

Het Trojan

Posted: March 28, 2006 | Category: Trojans
Het Trojan is a spyware, which can strongly harm any machine with no proper security installed on it. By sneaking into a target PC from many Internet resources, this spyware starts its harmful activities, which are a real threat to the computer's stability and security. Removing this pest as soon as possible is always a good choice. The following files were created in the system:

FriendsBlog

Posted: March 28, 2006 | Category: Adware
FriendsBlog is an adware spyware that opens pornographic web sites without user consent and asks the user to register and pay a fee for certain adult services. The following files were created in the system:

Acext

Posted: March 28, 2006 | Category: Spyware
Acext is a malware spyware that attempts to track user Internet activity and transfer gathered data to the www.autoraskrutka.ru web site. Acext is bundled with some advertising-supported products. It can also be manually installed. The threat automatically runs on every Windows startup.

HyperBar

Posted: March 28, 2006 | Category: Adware
HyperBar is an Internet Explorer toolbar providing a web search service and few useful tools. HyperBar modifies the web browser's default search settings and changes the Internet Explorer home page. HyperBar may also show annoying commercial advertisements. The threat must be manually installed. HyperBar runs every time the user launches Internet Explorer.

PLook

Posted: March 28, 2006 | Category: Adware
PLook is an adware application designed to download from a predetermined remote host and show commercial pop-up advertisements. PLook doesn't carry any destructive payload. The threat is able to update itself via the Internet. It must be manually installed. PLook automatically runs on every Windows startup.

DollarRevenue

Posted: March 28, 2006 | Category: Adware
DollarRevenue is an adware application that silently downloads from the Internet main components of certain advertising software and installs them to the computer without user knowledge. DollarRevenue is bundled with some ad-supported products. The threat doesn't carry any dangerous payload. DollarRevenue may install itself without user's consent.