Overload Trojan

Posted: March 28, 2006 | Category: Trojans
Overload Trojan is a part of a wide family of VBS-spywares, which usually infect the computer as macros from many MS Office documents. This particular spyware uses mainly Word and Excel documents as ways of getting into PC. Once this script is run, it damages many important Office components and makes the whole computer work in improper way. The following files were created in the system:

Pie Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was written in Visual Basic Script language, is a potent threat for every computer with no good defense installed on it. Pie Trojan usually acts by performing a set of destructive actions, which are always able to make the infected computer work in improper way. The following files were created in the system:

Rated Trojan

Posted: March 28, 2006 | Category: Trojans
Rated Trojan is a versatile spyware, which is able to harm the infected computer in many ways. This spyware may infect the computer from IRC or e-mail . Rated Trojan is able to take a partial control over the IRC client and give the hacker an ability to steal many pieces of confidential data. What is more, this pest usually creates a lot of junk files on the infected machine. The following files were created in the system:

Toren Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a dangerous spyware, which usually infects the computer as a macro from many MS Office documents. Once run, this script starts performing its destructive actions , which often result in unwanted consequences . The following files were created in the system:

Bugregcon Trojan

Posted: March 28, 2006 | Category: Trojans
Bugregcon Trojan is a very dangerous spyware, which usually affects the registry of the infected machine. This technique is really dangerous, because, in case of this trojan's success, the computer may become unusable and start working in improper way. There's no need to remind once again that the best defense against such spywares is not to open any files you don't know. The following files were created in the system:

Dome Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was written in Visual Basic Script language, is a dangerous trojan, which is always able to become a reson of many problems for every PC. By using its specific algorithms, Dome Trojan modifies many critical computer components and leads to different unwanted effects, such as computer instability. The following files were created in the system:

Vanina Trojan

Posted: March 28, 2006 | Category: Trojans
Vanina Trojan is a dangerous spyware, which was written in Visual Basic Scripting language. This pest performs two sets of action. The first one consists of overwriting many computer files, which are tremendously important for the proper computer working. The second one is sending 1000 e-mail letters to some certain addresses in Argentina. The following files were created in the system:

WinCrash

Posted: March 28, 2006 | Category: Trojans
This spyware, which was created in Java Script, is aimed to damaging Microsoft Windows operating computers. WinCrash performs a set of actions , which usually result in computer instability and full or partial loss of important data. The following files were created in the system:

VCL Restart Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a spyware, which is able to make an infected computer almost completely unusable. Any computer, which is infected with VCL Restart Trojan, restarts after a specified period of time . This technique is always a threat for the user's productivity, that's why removing this pest from the infected machine as soon as possible would be a good decision. The following files were created in the system:

VFat Trojan

Posted: March 28, 2006 | Category: Trojans
VFat Trojan is a dangerous spyware, which often infects the computer from many Internet resources, such as suspicious web sites or peer-to-peer networks. After the infected file is run on a specific PC, several unwanted effects might occur. The following files were created in the system:

VintuHana Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is always a threat for every user, if there's no good defence installed on his or her PC. VintuHana Trojan usually performs a set of actions, which often damage the hard disk of the infected machine. These actions usually result in a complete loss of data, but sometimes hardware can be damaged seriously. The following files were created in the system:

Virusman Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and easily recognisable for many modern antiviral computers, Virusman Trojan is still able to damage several types of operating computers. This pests usually acts by deleting several vitally important files, which are tremendously important for the proper computer working. The following files were created in the system:

BAT.Virh

Posted: March 28, 2006 | Category: Trojans
This dangerous batch-file infector usually acts by searching for other BAT-files and overwriting them with a copy of infection. There are always several critical BAT-files , which are responsible for the proper and stable computer working, that's why removing this spyware as soon as possible would be the best decision possible. The following files were created in the system:

Volkoser Trojan

Posted: March 28, 2006 | Category: Trojans
Even though this spyware isn't as destructive as several well known backdoors are, it still is able to become a reason of many computer troubles, that's why staying protected from Volkoser Trojan by keeping your antiviral definitions up-to-date is strongly recommended. The following files were created in the system:

VoltAOL Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which usually tries to sneak silently into the machine from many Internet resources . With the help of VoltAOL Trojan the hacker gets an ability of stealing confidential information from the infected PC and damaging this PC in many ways. The following files were created in the system:

Voob Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan has a lot of common with a typical nuker. By using its specific algorithms, Voob Trojan damages critical computer components and often disables the infected computer. This always result in many negative consequences, like the loss of important data, that's why staying protected against such spywares is always recommended. The following files were created in the system:

VVD Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old, obsolete and unable to infect several types of modern computers, it is still really dangerous for old machines. By performing a set of destructive actions, VVD Trojan makes the computer work in unstable way. This is always dangerous for the user's productivity, that's why it's strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

Society Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is very similar to a virus because of its brutal activities and ability to infect other machines. Society Trojan usually acts by damaging many critical computer components. The loss of these components usually results in computer instability and the loss of data. The following files were created in the system:

Wallpaper Killer

Posted: March 28, 2006 | Category: Trojans
As it is clear from the name of this spyware, Wallpaper Killer specializes in damaging the wallpaper of the active desktop. Although this actions isn't really harmful , it's still strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

WarFair Trojan

Posted: March 28, 2006 | Category: Trojans
WarFair Trojan is a dangerous spyware, which can always infects the computer with no good defence installed from many Internet resources or e-mail messages from unknown senders. WarFair Trojan usually performs several destructive actions , which often result in computer instability and the loss of performance. The following files were created in the system: