Ilona Trojan

Posted: March 28, 2006 | Category: Trojans
Ilona trojan is a dangerous spyware and a potent threat for those users, who have no good defence on their PCs. This spyware usually performs many actions on the infected machine; some of these actions may annoy the user, others are really destructive and make the computer work in unstable way. It's always a wise decision to remove Ilona Trojan from the infected machine as soon as possible. The following files were created in the system:

IndepDay Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan has a lot of common features with a typical worm, that's why IndepDay is always a potent threat. After sneaking into a computer, IndepDay starts its usual activities, which may lead to many serious consequences . It is always recommended to keep your antiviral application updated in order to prevent such trojans from infecting your computer. The following files were created in the system:

Inetcrck Trojan

Posted: March 28, 2006 | Category: Trojans
As most of trojans do, Inetcrck Trojan doesn't strive to send its copies to many addresses and infect as many PCs as possible. This spyware concentrates on harming one particular machine by damaging its files and changing other components. The following files were created in the system:

PestTrap

Posted: March 28, 2006 | Category: Malware
PestTrap Pest Trap is a rogue anti-spyware application. Pest Trap may note harmless software as threats in an attempt to have you purchase Pest Trap's full version to remove these harmless programs. PestTrap may also automatically launch at your computer's startup and scan your computer. Pest Trap may be knowingly downloaded and installed by users, and it may be installed without permission through browser exploits.

Adware Punisher

Posted: March 28, 2006 | Category: Adware
Adware Punisher Adware Punisher is a rogue anti-spyware application. Adware Punisher may note harmless software as threats in an attempt to have you purchase Adware Punisher's full version to remove these harmless programs. Adware Punisher may also automatically set itself to launch at your computer's startup and scan your computer. Adware Punisher may be knowingly downloaded and installed by users, and it may be installed without permission through browser exploits.

Desktop Snooper

Posted: March 28, 2006 | Category: Keyloggers
Desktop Snooper is a commercial PC surveillance application designed to monitor user activity by taking screenshots and recording keystrokes. The software must be manually installed. Desktop Snooper automatically runs on every Windows startup.

Zerobe

Posted: March 28, 2006 | Category: Trojans
Zerobe is a trojan that runs a hidden mail server used by remote attackers to send out spam e-mails through the compromised PC. The following newly produced Registry Values are: HKEY..\..\..\.. {RegistryKeys} HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunWinMedia

Infinite Beep

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which means that it usually concentrates on harming one single PC. Some of the activities of this pest may lead to many negative consequences, such as: computer crashes, instability of the machine or loss of important data. The following files were created in the system:

InfoSpace Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware was created in 1996 and many modern computers are immune to its activities, InfoSpace Trojan is still a potent threat for those, who use old operating computers. This spyware is able to make a lot of serious problems, which may result in computer instability or loss of data. The following files were created in the system:

Insider Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a real threat for everybody, who has no reliable defence installed on his or her PC. By using its specific algorithms, Insider Trojan usually brings a lot of problems by corrupting many files and performing other destructive actions. It is always a good choice to keep your antiviral computer up-to-date in order to protect your machine from this pest. The following files were created in the system:

Install Vivid Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which is able to harm any computer. By using its specific stealth algorithms, Install Vivid Trojan tries to sneak into a target computer and perform its destructive activities there. Various negative effects may be found on the infected PC, that's why removing it from the machine as soon as possible would be the best decision. The following files were created in the system:

Int 13 Trojan

Posted: March 28, 2006 | Category: Trojans
By using its specific attack methods, this spyware may easily damage the stability and privacy of the infected computer. Int 13 Trojan was written in ASM language, that's why it's really small and quite hard to detect with many antiviral applications. It is strongly recommended to get latest virus definitions and perform a full scan of your PC, if you suppose that it might be infected with Int 13 Trojan. The following files were created in the system:

System Surveillance Pro

Posted: March 28, 2006 | Category: Keyloggers
System Surveillance Pro is a commercial PC product that tracks user activity, logs keystrokes, takes screenshots, captures online chat conversations and records web sites visited. Gathered data can be sent to a predefined remote host. System Surveillance Pro must be manually installed. It runs on every Windows startup.

Smart Keystroke Recorder

Posted: March 28, 2006 | Category: Keyloggers
Smart Keystroke Recorder is a commercial PC surveillance application that tracks user activity, logs keystrokes, takes periodic screenshots, captures online chat conversations, intercepts network traffic, records passwords and web sites visited. Gathered data can be sent to a configurable e-mail address. Smart Keystroke Recorder must be manually installed. It runs on every Windows startup.

Red Handed

Posted: March 28, 2006 | Category: Keyloggers
Red-Handed is a commercial PC surveillance application that monitors and records all sent and received AIM instant messages. Gathered data is stored in encrypted log files. Those files can be secretly transferred to a predefined remote PC. Red-Handed must be manually installed. The application runs a service on every Windows startup.

Spy Falcon

Posted: March 28, 2006 | Category: Trojans
Spy Falcon is a rogue anti-spyware application. Spy Falcon may appear as an icon in your Windows tray and show a message that says your PC is infected with malware. Spy Falcon may then suggest you download and install software to remove this malware. If you follow its directions, you will download Spy Falcon, and once downloaded Spy Falcon may redirect your Internet Explorer home page and search results to a malicious website. Spy Falcon may also download and install other software without...

IntLock trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan, which was created in 1994, is quite old and easy to recognize for the majority of modern security computers, it's still dangerous because of its destructive actions. IntLock Trojan usually acts by locking computer interrupts; this action can paralyse many computers if no actions against this spyware are taken soon after infection. The following files were created in the system:

IRC.Microb

Posted: March 28, 2006 | Category: Trojans
Although this trojan is quite old, it's still a threat, especially for those, who use IRC frequently. By using its specific algorithms, IRC.Microb damages some certain ICR settings, causing many negative effects, which can lead to serious consequences . The following files were created in the system:

IRC.Mox

Posted: March 28, 2006 | Category: Trojans
This trojan is a potent threat for every user, who has an IRC installed on his or her PC. After infecting a computer, IRC.Mox searches for IRC on it and tries to give the hacker a remote access to it. In case of success, the hacker gets a partial control over an infected PC and an ability to steal many private pieces of data . The following files were created in the system:

IStartHere Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a trojan, which concentrates on damaging one particular machine instead of spreading its copies. IStartHere Trojan usually performs annoying actions . Although there is not much potential danger, it's still recommended to remove this pest from the infected computer as soon as possible. The following files were created in the system: