MSNTwo Trojan

Posted: March 28, 2006 | Category: Trojans
MSNTwo Trojan is a dangerous trojan, which is always able to damage the user's security and privacy. This spyware acts by searching for MSN messenger and connecting to it. In case of success, MSNTwo Trojan gives the anonymous hacker an access to this messenger. The hacker is able to steal user's passwords or simply read his or her private messages. The following files were created in the system:

PassW Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a password capturer; this means it is always a great threat for the privacy of every user, who has no reliable defence installed on his or her PC. PassW Trojan acts by logging user's keystrokes, writing this information into a special log-file and regularly sending such files to the anonymous hacker. The following files were created in the system:

lookfor.cc

Posted: March 28, 2006 | Category: Browser Hijackers
lookfor Hihacks explorer page and directs it to http://www.lookfor.cc/index.php?p=xxxxx, there xxxxx is the ID code. Also tries to oblige to edit register keys at: HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMainstart page The following files were created in the system:

Redart.2796

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which is really dangerous because of its specific method of infecting the PC. Redart.2796 is able to sneak into the computer from the infected JPG-file. This technique is quite rare, that's why many users, who don't know about it, usually carelessly open the infected file. This pest is able to perform many destructive actions, which are always able to damage the user's privacy and his or her computer's performance. The following files were...

VirtualRobot Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan dropper, which means it is always able to infects the computer with many spywares. These spywares may seriously damage the security and stability of the infected machine, that's why removing VirualRobot Trojan is strongly recommended. The following files were created in the system:

Wabrex Trojan

Posted: March 28, 2006 | Category: Trojans
There are no doubts about how destructive this trojan can be. Wabrex Trojan is able to sneak silently into the PC and start performing its destructive actions, which are often invisible to the user, but really dangerous for the whole computer. In result of these activities the computer may become really unusable and the damage will be extremely hard to repair. The following files were created in the system:

Weird Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a very versatile trojan, which is able to damage the infected computer in many ways. For example, Weird Trojan can write itself into the end of each EXE-file found or make the computer to start the infected file on each start-up. What is more, this pest has a backdoor's abilities - it connects to the Internet and gives a partial control over the machine to the anonymous hacker. Although there are not so many actions, available to the hacker , he or she is still able to upload...

ZombGet Trojan

Posted: March 28, 2006 | Category: Trojans
One of the most versatile ever created, ZombGet is able to harm the infected computer in different ways. First of all, it is able to carry many spywares and install them onto the target PC. Secondly, ZombGet is able to perform destructive actions by itself. Finally, ZombGet is a backdoor, which usually provides the anonymous hacker with almost full control over the infected machine. It's strongly recommended to keep your antiviral definition up-to-date in order to protect your PC from...

XC Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a backdoor trojan, which is always able to provide the anonymous hacker with a partial control over the infected hacker. The hacker is able to upload/download many files, modify computer settings or steal user's passwords and private messages. XC Trojan compromises the user's privacy strongly, that's why it's always recommended to remove it from the infected machine as soon as possible. The following files were created in the system:

Xexyl Trojan

Posted: March 28, 2006 | Category: Trojans
Xexyl Trojan is a dangerous boot infector, which is always able to harm the infected machine. This spyware performs many changes in the computer; these changes always result in unstable computer working and other negative effects. The following files were created in the system:

Xploiter Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious and really harmful spyware is always able to become a reason of many problems for every user, who has no reliable security installed on his or her PC. Xploiter Trojan usually uses several known security holes and sneaks into the machine through them. This pest is able to harvest for specific pieces of data and send them to the anonymous address. The following files were created in the system:

Xtra Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous backdoor trojan is a dangerous tool of destruction in the hands of many hackers. With the help of this spyware, the anonymous hacker is able to get a partial control over the computer and start performing its activities there. These activities may vary from uploading or downloading different files to stealing user's passwords or login information. The following files were created in the system:

Xtra2 Trojan

Posted: March 28, 2006 | Category: Trojans
Xtra2 Trojan is an improved version of the Xtra backdoor. This spyware is always a threat for those users, who are careless enough to have their PCs unprotected. Xtra2 gives the anonymous hacker a control over the infected PC and an ability of performing many destructive actions there. Such actions include stealing user's passwords and private information, that's why it's always recommended to get rid of this spyware as soon as possible. The following files were created in the system:

XYProj Trojan

Posted: March 28, 2006 | Category: Trojans
XYProj Trojan is a spyware, which usually infects the computer from many Internet resources, such as newsgroups, chats or peer-to-peer networks. XYProj Trojan's activities usually result in different consequences , that's why it's recommended to get rid of this pest as soon as possible. The following files were created in the system:

Yahoo Pager Crack

Posted: March 28, 2006 | Category: Trojans
This spyware pretends to be a valuable crack, but it has several features, which make it a dangerous backdoor trojan. This pest usually acts by logging user's keystrokes and sending these logs to the anonymous Internet address. This technique always results in the loss of confidential data and compromises the user's privacy, that's why it's recommended to treat such applications carefully. The following files were created in the system:

Yahoo Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a trojan, which usually acts by fooling inexperienced users and stealing their passwords. Yahoo Trojan shows the dialog box, which requires user's ID and password to be entered. Once the user enters his private information, this pest writes it into a special log file, which is always available for the hacker. The following files were created in the system:

Snoop Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is an annoying trojan, which usually acts by infecting the computer from the Internet and starting its malicious activities. Snoop Trojan is able to mine some pieces of specific data and send them to the specified address. This usually compromises the user's privacy, that's why it's recommended to stay protected from such spywares by installing a good and updated antiviral computer. The following files were created in the system:

ZAKiller Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is especially dangerous for those users, who have Zone Alarm firewall installed on their PCs. ZAKiller Trojan acts by killing this firewall's process, but keeping an illusion of its working by simulating a real ZA icon. This technique is really dangerous, because the infected computer losses the protection against many spywares, which can freely connect to the Internet and send private information to hackers. The following files were created in the system:

Zap Trojan

Posted: March 28, 2006 | Category: Trojans
Zap Trojan is a dangerous spyware, which usually infects the computer from many Internet resources and performs a set of destructive actions there. These actions lead to many consequences, which may result in computer instability, the loss of files or performance, etc. The following files were created in the system:

Zebra Trojan

Posted: March 28, 2006 | Category: Trojans
Zebra Trojan is a dangerous pest, which is often able to damage the security and the stability of the infected computer. After sneaking into the machine , Zebra starts performing its destructive actions, which often result in a headache for the user. The following files were created in the system: