Havoc Trojan

Posted: March 28, 2006 | Category: Trojans
Although this malicious spyware, which was written in 1997, is quite old and unable to damage modern computers, it is still really dangerous because of its destructive actions. The main function of Havoc Trojan is providing its owner with a partial access to the infected machine; the hacker is able to perform a set of many actions, such as stealing passwords and logins. The following files were created in the system:

Havocore Trojan

Posted: March 28, 2006 | Category: Trojans
Havocore Trojan is a dangerous backdoor, which sneaks into the computer and tries to give the anonymous hacker a remote control over infected PC. It also writes itself into Windows registry; this method gives Havocore Trojan an ability of starting each time operating computer is started. With the help of this destructive utility the hacker can get user's confidential information, change computer settings or even infect the machine with other pests. The following files were created...

HD Trojan

Posted: March 28, 2006 | Category: Trojans
HD Trojan is an old and obsolete spyware, which specializes in damaging DOS computer. This pest acts by deleting many files, some of which might be critically important for the proper computer working. Although there is almost no possibility of getting infected with this rarity, it is still recommended to treat unknown files carefully. The following files were created in the system:

Heathen Trojan

Posted: March 28, 2006 | Category: Trojans
Heathen Trojan is a destructive spyware, which specializes in damaging computer's components and causing it work improperly. Heathen infect many critical files and, as a result of this, makes the infected machine very unstable. The following files were created in the system:

Heckler Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware isn't able to damage infected computer, its actions are always annoying and able to cause serious loss of user's productivity. It's really hard to remove this pest manually by killing its process and remove its files because of its specific security algorithms. The following files were created in the system:

Aduent Trojan

Posted: March 28, 2006 | Category: Trojans
Aduent Trojan is a malicious downloader, which acts by connecting to anonymous IP and downloading specific spyware from there. This spyware is named 'SurferBar' and acts by creating annoying Internet Explorer toolbar. Although this technique isn't dangerous, it’s still strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

Hello Trojan

Posted: March 28, 2006 | Category: Trojans
Hello Trojan is a dangerous MSN-trojan, which specializes in infecting this messenger and stealing confidential data. For example, this spyware can easily log user's keystrokes and steal his or her MSN password. After this happens, Hello Trojan sends password to the anonymous hacker. The following files were created in the system:

Kility Trojan

Posted: March 28, 2006 | Category: Trojans
Kility Trojan is a really annoying spyware, which acts by disabling paste function in Windows softwares. This method doesn't carry any destruction, but still is extremely annoying and can result in the loss of user's productivity. The following files were created in the system:

Gaslide Trojan

Posted: March 28, 2006 | Category: Trojans
This parasitic trojan isn't extremely dangerous for computer's stability, but still its actions are very annoying and harmful. First of all, Gaslide Trojan infects EXE-files with a copy of itself. This technique makes it possible to execute trojan's main part every time when an infected file is run. What is more, Gaslide performs several other annoying actions, such as making changes in Internet Explorer's settings. The following files were created in the system:

Qforager Trojan

Posted: March 28, 2006 | Category: Trojans
QForager is a malicious spyware, which usually sneaks silently into the computer from many suspicious Internet resources and starts performing its destructive activities. This pest's activities include only stealing passwords from QQ messenger; once the user tries to enter his or her password, QForager logs it and sends to the hacker via e-mail. The following files were created in the system:

Lariara Trojan

Posted: March 28, 2006 | Category: Trojans
Lariara Trojan is a specific trojan, which was written in Visual Basic Scripting language. There aren't many destructive actions available to this trojan; Lariara Trojan can seriously damage the infected PC only on the 22nd of October when it shows a thousand of annoying messages. The following files were created in the system:

Balick Trojan

Posted: March 28, 2006 | Category: Trojans
Balick Trojan is a harmless spyware, which installs itself onto the target computer and uses it for connecting to many web sites and producing ad-clicks. Although no serious threat for the user of infected machine can occur, it's still recommended to get rid of this junk as soon as possible. The following files were created in the system:

Simpsons

Posted: March 28, 2006 | Category: Trojans
This malicious spyware usually infects the computer as a self-extracting batch-file and waits for the careless user to run it. If this happens, Simpsons start an attempt of deleting all files from the hard disk of infected machine. In case of success all data might be lost and extremely hard to restore. The following files were created in the system:

PictureNote Trojan

Posted: March 28, 2006 | Category: Trojans
Although this pest, which was created in 1998, is quite old and easily recognisable by many modern antiviral computers, it is still quite dangerous for those users, who have no reliable defence installed on their PCs. PictureNote usually infects the computer as a picture.exe file, attached to suspicious e-mail letter. If a user runs this file, it searches for AOL information and sends it to the anonymous hacker. The following files were created in the system:

Bla Trojan

Posted: March 28, 2006 | Category: Trojans
Bla Trojan is a dangerous and very destructive backdoor trojan, which acts by providing the anonymous hacker with a partial control over infected computer. This means the hacker gets an ability of performing a wide variety of actions, such as stealing confidential data, deleting and corrupting files, uploading other pests, etc. The following files were created in the system:

3B Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is really old and out of circulation, it still is really dangerous trojan, able to damage the stability of infected machine strongly. 3B Trojan acts by attempting to format the hard drive of the target PC; in case of success, all data stored on this disk will be lost and almost impossible to restore. The following files were created in the system:

Phreak Trojan

Posted: March 28, 2006 | Category: Trojans
Phreak Trojan is a harmless spyware, which is only able to cause a little confusion. This pest acts by showing a picture of a ghost girl and, in parallel with that, opening and closing CD-ROM. Only because of this last action this pest can be reckoned a trojan. The following files were created in the system:

Septer Trojan

Posted: March 28, 2006 | Category: Trojans
This pest pretends being an appeal for donation, sent by American Red Cross. The truth is that it is a dangerous trojan, which sends this confidential information to the specified Internet address. In case of this pest's success, private information about user's credit card can be lost. The following files were created in the system:

Masteal Tojan

Posted: March 28, 2006 | Category: Trojans
Masteal is a really annoying and dangerous spyware, which is always a threat for user's privacy. It acts by stealing all addresses from Microsoft Outlook address book and writing them into a shell.dll.txt file. This file is then easily available to the hacker. This technique makes it possible for the anonymous hacker to add all addresses from victim's address book to Spam-lists. The following files were created in the system:

VBS.Icon

Posted: March 28, 2006 | Category: Trojans
VBS.Icon is a harmless trojan with only one action available to it. This pest modifies Windows registry in a specific way; this makes HTML files have different icons. Although this pest can cause no serious troubles, it is still recommended to get rid of it as soon as possible. The following files were created in the system: