Ume Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which may hit every computer via many Internet resources, such as newsgroups or peer-to-peer networks. Ume Trojan makes some certain changes in the infected computer settings; this usually leads to unwanted consequences, such as computer instability or loss of important data. The following files were created in the system:

Mind Control 5.0

Posted: March 28, 2006 | Category: Trojans
This pest is an upgrades version of the Mind Control trojan. This spyware, just like an earlier variant, gives the hacker almost total control over the infected computer and the ability of performing many annoying and destructive actions. Being infected with Mind Control 5.0 may result in many unwanted effects, such as the loss of confidential data or computer instability. The following files were created in the system:

Mip Trojan

Posted: March 28, 2006 | Category: Trojans
Mip Trojan is a potential threat for every computer, which has no good and reliable defence against such spywares. After sneaking silently into a target computer, this pest starts performing its activities, which may cause serious negative effects and lead to computer instability and loss of performance. The following files were created in the system:

MIRC Korpie Trojan

Posted: March 28, 2006 | Category: Trojans
MIRC Korpie Trojan usually infects the computer after its user accepts many suspicious DCC file transfer proposals in mIRC or follows suspicious links. After infecting a computer, this spyware usually starts performing its destructive activities, which may often lead to more serious troubles . The following files were created in the system:

MIRC Sunova Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware usually infects PCs through IRC channels. A typical scheme of getting infected can be described in the following way: the IRC user receives the DCC transfer proposal from unknown address, accepts this proposal and gets his or her machine infected with MIRC Sunova Trojan. Negative effects, which may be caused by this trojan, vary from annoying actions to serious computer troubles . The following files were created in the system:

Shield Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan claims to be the remover of many IRC viruses. After Shield Trojan is run on a specific computer, it starts performing its destructive actions, which may cause many negative effects and result in computer instability, the loss of data or performance problems. The following files were created in the system:

MIRC Update Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually deals with IRC if such application is installed on the infected machine. MIRC Update Trojan pretends to be a harmless application, designed for updating mIRC version, but instead of this it performs a set of actions, which may totally disable mIRC or even cause some serious computer problems. The following files were created in the system:

Mmdub Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware, which was created in 1995, is quite old and unable to damage many modern computers, it still is a threat for those users, who have old operating computers on their machines. Mmdub Trojan performs many destructive actions , which may cause improper computer working and other serious consequences. The following files were created in the system:

Monator Trojan

Posted: March 28, 2006 | Category: Trojans
This backdor is usually used for breaking into many PC computers. If no actions against this infection are taken immediately, the hacker may perform a lot of dangerous actions, which often seriously damage the infected PC by changing its settings and files. The hacker is also able to steal many private data from the infected computer. The following files were created in the system:

Monator 3.2 Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan another version of a well-known backdoor. With the help of this tool, the hacker is able to break into a target computer and start performing its actions. Some of these actions may only annoy the user of an infected PC; other actions are really dangerous and often cause many unwanted effects, such as computer instability or loss of performance. The following files were created in the system:

Monator 3.5 Trojan

Posted: March 28, 2006 | Category: Trojans
As a newer version of a well-known Monator Trojan, this spyware is able to damage the infected PC strongly. With the help of this backdoor, the hacker is able to install many files onto the infected computer, change its settings or steal many private pieces of data. The following files were created in the system:

MotleyCrue Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after getting infected, it may become a real problem and produce many unwanted effects. These effects may vary from several annoying trifles to the loss of important computer data or performance. The following files were created in the system:

Movie Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan; this means that it doesn't try to send its copies to as many addresses as possible, but concentrates on damaging one single machine. Among destructive actions, available to Movie Trojan, are several really dangerous, which often make computer work in unstable way and cause a loss of important information. The following files were created in the system:

AntiBTC Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan isn't really harmful usually, but still it can make a lot of annoying problems to the user of the infected computer. AntiBTC Trojan usually deals with IE by changing its start page and other settings. What is more, this spywares activates itself from time to time and tries to connect to several Bulgarian Web servers. The following files were created in the system:

MSN BigBot

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which specializes in working with MSN messenger. Once this trojan is run on the PC with MSN installed, it connects to this messenger and gives the hacker a partial control over it. The hacker is able to steal many secret data or change different MSN settings. The following files were created in the system:

MSN Cookie

Posted: March 28, 2006 | Category: Trojans
This trojan was designed with one specific aim: MSN Cookie usually asks the user to enter his or her MSN personal information and then sends this information to the anonymous address. The loss of this information may result in many negative consequences; that's why it's strongly recommended to treat such spywares carefully. The following files were created in the system:

MSN Cookie 1.0

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which may usually fool the inexperienced user and steal its MSN account. This always results in several unwanted problems, that's why it's always recommended to remove MSN Cookie The following files were created in the system:

MSN Cookie 2.5

Posted: March 28, 2006 | Category: Trojans
This trojan is an another variation of a well-known MSN Cookie Trojan. This spyware usually sneaks silently into a target computer and tries to fool the user. In case of success , this pest sends user's password to the anonymous location on the Internet. The following files were created in the system:

MSSC Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a potential threat for those users, who have no reliable defence installed on their PCs. After infecting a computer, MSSC Trojan starts performing its destructive activities, which may result in computer instability and even the loss of very important data. The following files were created in the system:

Mucko Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and many modern computers are simply immune to its activities, it's still a big threat for users of old operating computers. After sneaking into a target machine, Mucko Trojan starts performing its destructive actions , which usually lead to computer instability and decrease its performance strongly. The following files were created in the system: