BAT.Hot2Trot

Posted: March 28, 2006 | Category: Trojans
BAT.Hot2Trot is a dangerous batch-file infector, which usually sneaks into the PC from many Internet resources and starts performing its activities. These activities consist of finding and infecting many BAT-files. The loss of these files' original content can often result in many problems, such as computer instability. The following files were created in the system:

BAT.IBBM.ClsV

Posted: March 28, 2006 | Category: Trojans
This spyware is quite harmless for many users, who have modern operating computers installed on their PCs. BAT.IBBM.ClsV usually deals with DOS function ClearScreen; the often use of this method may sometimes annoy those people, who use DOS frequently. The following files were created in the system:

BAT.England

Posted: March 28, 2006 | Category: Trojans
This malicious spyware may infect the computer in several variants, that's why there's no guarantee that your antiviral application will protect your machine from rare and almost unknown versions. This pest acts by infecting other BAT-files , that's why it's strongly recommended not to open any files you don't know. The following files were created in the system:

BAT.Homeslice

Posted: March 28, 2006 | Category: Trojans
If no actions against this infector are taken soon after getting infected, it may infect many important computer components and lead to many unwanted consequences, such as slowdown, crashes, etc. BAT.Homeslice uses simple and effective technique of finding and infecting different BAT-files, that's why it's usually quite hard to detect and remove this pest completely. The following files were created in the system:

BAT.Jany

Posted: March 28, 2006 | Category: Trojans
There are several versions of this spyware, that's why there's always a possibility that your antiviral computer will not recognise a rare variant of this trojan. BAT.Jany searches for BAT-files and infects them by adding infected code to the original code of every file found. Several BAT-files are tremendously important for the computer, that's why the loss of such files can often result in different troubles, such as the loss of performance or important data. The following files...

BAT.Tiers

Posted: March 28, 2006 | Category: Trojans
This parasitic trojan is a batch-file infector, which usually acts by infected every BAT-file, which is found in the current directory. The code of infection is added to the end or the beginning of the host file, which makes it possible to call this routine each time the infected file is run. Although there's no reason to worry about great destruction, because this pest is quite harmless, it's strongly recommended to get rid of it as soon as possible. The following files were...

BAT.Impression

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and obsolete, it is still able to become a reason of many annoying problems. This trojan acts by infecting other BAT-files. This technique can even lead to several negative consequences, such as computer instability, but this case is a rare one. The following files were created in the system:

BAT.Invader

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is one of the well-known BAT-trojans. These trojans usually acts by finding and infecting many files . This trojan's activities can often result in computer instability and other unwanted consequences, that's why getting rid of BAT.Invader is always advisable. The following files were created in the system:

BAT.Iona

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan has several features, which are common for worms, that's why it's really dangerous for every user, who has no good defence installed on his or her PC. If no actions against this spyware are taken as soon as possible, many negative consequences may occur. The following files were created in the system:

BAT.Kangaroo

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a member of a huge BAT-infectors' family. This means that BAT.Kangaroo acts by searching for BAT-files and infecting them with its own code. This technique often results in many problems, such as the loss of important information and computer instability. The following files were created in the system:

BAT.Kirdik

Posted: March 28, 2006 | Category: Trojans
If no actions against this pest are taken soon after getting infected, it can produce several really destructive actions, aimed at corrupting many key computer components. In the result of this infector's activities such troubles as computer instability or slowdown may occur. The following files were created in the system:

RemScan Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a backdoor trojan, which is always able to damage the infected machine by giving the access to it to the anonymous hacker. He or she gets an ability of performing many actions on the target PC. It's strongly recommended to detect and remove this pest from the PC as soon as possible. The following files were created in the system:

Agobot Trojan

Posted: March 28, 2006 | Category: Trojans
Agobot Trojan is a malicious program that uses its own algorithms for the purpose to damage its vitcim's computer. Agobot Trojan may modify your Internet settings and disables the function of automatic security updates. Once security settings are lowered, Agobot Trojan will scan for IRC client with a reason to infects it. Therefore, the hacker gets access over the infected computer and may control it via IRC network. The opened security hole allows attacker to install aditional malware and...

ForBot Trojan

Posted: March 28, 2006 | Category: Trojans
This backdoor trojan usually uses a common method of sneaking into the PC. ForBot Trojan usually arrives as an attachment from e-mail letters and, if user runs the attached files, starts performing its routine. This pest connects to IRC client and waits for the hacker's commands. These commands may cause many effects, such as the loss of private data or different computer troubles . The following files were created in the system:

Joiner Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a backdoor trojan, which is always able to compromise the user's security and privacy. After sneaking into the PC, Joiner Trojan gives the hacker a partial access to the machine; the hacker is then able to perform many actions, such as stealing user's login information. This technique is always a point of great danger, that's why it's recommended not to open any files you don't know and scan them with your antiviral computers. The following files were...

AcidShiver Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a backdoor trojan, which is always able to jeopardise the user's privacy and his or her PC's stability. AcidShiver Trojan usually provides the hacker with an opportunity of performing many destructive actions, which consist of stealing user's passwords, making changes in computer settings, uploading/downloading many files, etc. The following files were created in the system:

Advertor Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a backdoor, which usually infects the computer from many suspicious Internet resources or simply from e-mail messages from unknown senders. If no steps towards removing this pest are taken soon after getting infected, it can often lead to different negative consequences, such as the loss of private information. The following files were created in the system:

Aebot Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is an IRC backdoor, which specializes in performing its destructive actions through this chat client. If the user runs the infected file, it starts searching for IRC and, in case this application is found, connects to the hacker. The hacker is then able to send many commands, which are performed by the trojan. These commands can often become a reason of the loss of private information or other computer troubles . The following files were created in the system:

Afcore Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a trojan, which usually gives an access to the infected PC to the hacker and enables him or her to perform many actions. These actions are always being performed through the IRC client; this technique makes it quite hard to detect and remove this spyware, that's why it's strongly recommended not to open any files you don't know. The following files were created in the system:

Amanda Trojan

Posted: March 28, 2006 | Category: Trojans
Amanda is a dangerous backdoor trojan, which usually sneaks silently into the target PC ant waits for the user to run the infected file. If this happens, this pest tries to connect to the specified Internet address and give the hacker a remote control over the infected machine. This technique makes the PC helpless and unable to resist hacker's attacks. The main aim of these attacks is usually stealing user’s confidential information. The following files were created in the...