DLer Trojan

Posted: March 28, 2006 | Category: Trojans
DLer Trojan is a dangerous spyware, which usually specializes in stealing user's passwords, accounts and other private information. With the help of this tool, the anonymous hacker can easily get user's passwords and start using his or her accounts freely. The following files were created in the system:

DLP Trojan

Posted: March 28, 2006 | Category: Trojans
DLP Trojan is a dangerous backdoor, which uses its specific algorithms for providing the anonymous hacker with a remote control over infected computer. In case of success, the hacker can easily start performing many destructive actions, such as stealing user's passwords or uploading different spywares. The following files were created in the system:

Dmsys Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware usually specializes in infecting many instant messengers and stealing confidential information from there. By using its key logging technique, Dmsys Trojan can easily steal user's passwords and, what is more, private conversations. This information is written into a special log file, which is easily available to the hacker. The following files were created in the system:

DnsDoor Trojan

Posted: March 28, 2006 | Category: Trojans
DnsDoor is a backdoor application, which can always compromise the privacy and the security of every user with no proper defence installed on his or her PC. This pest acts by providing the anonymous hacker with a partial control over infected computer and, as a result of this, with an ability of performing a wide variety of destructive actions, such as stealing user's passwords and private messages. The following files were created in the system:

Doal Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which pretends being a serial key generator for Windows XP operating computer, is a dangerous trojan horse. Every machine can get infected with this pest through many peer-to-peer networks . If the infected file is run, this trojan activates itself and starts deleting many files. The following files were created in the system:

Phel Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a dangerous trojan downloader, which uses some certain known Windows vulnerabilities for infecting the target computer. Once the infected file is run , it starts creating different temporary files and downloads specific backdoor trojan, which can allow the hacker to break into infected PC and damage user's privacy strongly. The following files were created in the system:

DonaldDick Trojan

Posted: March 28, 2006 | Category: Trojans
DonaldDick Trojan is a malicious backdoor application, which was written in Russia. With the help of this software the anonymous hacker can easily get an access to the remote PC and start performing many actions, such as stealing confidential data or changing computer settings. These actions always compromise user's privacy and his or her PC's stability, that's why it's strongly recommended to get rid of this spyware as soon as possible. The following files were created in the system:

Lateda Trojan

Posted: March 28, 2006 | Category: Trojans
Lateda Trojan is a malicious backdoor trojan, which usually acts by giving the anonymous hacker an ability of uploading and running many spywares. What is more, this pest can also infect IRC client and receive commands from the hacker through this chat. The following files were created in the system:

Winlogo Trojan

Posted: March 28, 2006 | Category: Trojans
Winlogo Trojan is a dangerous trojan downloader, which usually uses one well known IE security hole for performing its destructive activities. In case of success of its actions, this pest downloads a backdoor trojan, which can easily connect to the hacker and give him or her a remote control over infected PC. The following files were created in the system:

Duddie Trojan

Posted: March 28, 2006 | Category: Trojans
Duddie Trojan is a really dangerous and destructive backdoor trojan, which usually sneaks into the computer through many suspicious Internet resources or simply as an attachment from suspicious e-mail letters. Once run on a PC, this pest tries to provide the hacker with a remote access to the machine and, in case of success, gives him or her an ability of stealing user's passwords, uploading other spywares, changing computer settings, etc. The following files were created in the...

DUT

Posted: March 28, 2006 | Category: Trojans
Although this malicious application isn't a typical backdoor trojan and is unable to give the hacker a remote control over infected PC, it is still able to damage user's privacy strongly. DUT acts by monitoring user's activities and, in case an attempt of password entering is detected, logging his or her keystrokes and writing them into a log file. There's usually no problem for the hacker to get this file and, as a result of this, steal user's web accounts. The following files were...

Echelon Trojan

Posted: March 28, 2006 | Category: Trojans
Echelon Trojan is a malicious application, which was written in Visual Basic Scripting language and is aimed at performing many annoying and sometimes even destructive actions. This pest acts by infecting IRC client and MS Outlook computer. In case of success, Echelon can start sending its copies through mIRC channels or simply as attachments in e-mail letters. The following files were created in the system:

EggHead Trojan

Posted: March 28, 2006 | Category: Trojans
EggHead Trojan is a dangerous backdoor trojan, which specializes in infecting different PCs by sneaking into them through IRC networks. This usually happens after a careless user follows some suspicious links or simply accepts unknown file transfer proposal. Once this had happened, EggHead Trojan can easily start performing its destructive actions, which vary from providing the hacker with a partial access to the infected machine to downloading other destructive spywares and installing them...

Elem Trojan

Posted: March 28, 2006 | Category: Trojans
Even though this pest isn't able to damage user's privacy strongly, it’s usually recommended to get rid of this pest as soon as possible. Elem Trojan acts by performing a wide variety of destructive actions, such as overwriting different files, modifying computer components, etc. This technique usually leads to computer instability and can even make it totally unusable. The following files were created in the system:

Elitem

Posted: March 28, 2006 | Category: Trojans
Elitem is a really destructive backdoor trojan, which uses its key logging technique for stealing many pieces of confidential and private data. This means the user of an infected PC can never feel safe and his or her passwords are always in danger of being stolen. The following files were created in the system:

Elitor Trojan

Posted: March 28, 2006 | Category: Trojans
Although this pest is quite simple and easily recognisable by many antiviral computers, its technique is always a threat for inexperienced users. Elitor Trojan usually pretends being a JPG-image of the naked celebrity and fools the user with this. Once a careless user runs the infected file, this trojan horse starts logging his or her keystrokes and stealing passwords. The following files were created in the system:

Enimen Trojan

Posted: March 28, 2006 | Category: Trojans
Enimen Trojan is a truly destructive spyware, which acts by hitting the computer from unknown e-mail letters or simply from many suspicious web pages. Once an infected file is run on a PC, this pest activates itself and starts performing its destructive activities, such as deleting user's files or corrupting computer's components. This technique is tremendously dangerous for the computer's stability, that's why it's strongly recommended to get rid of Enimen Trojan as soon as possible....

Enterprise Trojan

Posted: March 28, 2006 | Category: Trojans
Enterprise is a Trojan that provides an unauthorized user with remote control over your system. Enterpise makes it possible to capture your personal information as Enterprise may upload, download, and delete your personal files. Your computer's stability and security may further decrease as Enterprise chats with its server, locks up your computer, or shuts down or reboots Windows. Other symptoms of Enterprise may include your CD-rom opening and closing, your mouse shutting off, and your...

BAT.Eris

Posted: March 28, 2006 | Category: Trojans
This dangerous BAT-trojan is a really destructive spyware, which can harm the computer in many ways. First of all, right after sneaking into the computer this pest creates several temporary infected files and executes them. This makes it possible to continuously perform its destructive activities. What is more, this pest detects antiviral software installed and tries to remove it. In case of success infected machine becomes unprotected against a wide variety of spywares. The...

Eurosol Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a dangerous trojan, which usually sneaks into the computer from many suspicious Internet locations and tries to perform its specific destructive actions. These actions include modifying computer.ini file and harvesting for private WebMoney information. The following files were created in the system: