VBS.AutoExec

Posted: March 28, 2006 | Category: Trojans
VBS.AutoExec is a primitive trojan, which usually infects the computer as a part of HTML-files. If that happens, this pest tries to modify autoexec.bat file. This file is a critical computer component and the loss of its original content can often result in the loss of computer stability. As follows from everything written above, this pest should not be tolerated and careful attitude towards suspicious files is always recommended. The following files were created in the system:

ZeroBoot Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a very dangerous spyware, which specializes in damaging boot sector of the hard drive. This happens after ZeroBoot Trojan fills this sector with zeros. In a result of these actions, the infected machine will not boot from the hard drive and the whole computer will become temporarily unusable. The following files were created in the system:

Zeraf Trojan

Posted: March 28, 2006 | Category: Trojans
Zeraf Trojan is an extremely dangerous and destructive trojan horse. It acts by sneaking into the computer from many suspicious Internet locations. After that has happened, Zeraf starts its attempts to remove all critical computer files, such as computer.dat, computer.ini or explorer.exe. In case of success, the infected computer will become completely unusable and really hard to restore. The following files were created in the system:

XalNaga Trojan

Posted: March 28, 2006 | Category: Trojans
XalNaga Trojan is a malicious pest, which specializes in performing several harmful, but really annoying actions. For instance, this spyware hides several important options, such as 'Find Files', 'Shutdown' and 'Run' from the start menu. What is more, it hides the desktop and shows annoying messages. The following files were created in the system:

FireKill Trojan

Posted: March 28, 2006 | Category: Trojans
FireKill is a very dangerous trojan horse, which specializes in disabling antiviral software. With the help of its specific deadly algorithms, this pest searches for many processes and kills them. What is more, it can perform several changes in the settings of antiviral software; for instance, it can disable Auto-Update and Auto-Protect functions. The following files were created in the system:

VirtualRoot Trojan

Posted: March 28, 2006 | Category: Trojans
VirtualRoot is a dangerous backdoor trojan, which usually hits the computer, which is infected with a CodeRed Worm. After that worm drops VirtualRoot onto infected PC, the anonymous hacker gets a partial control over infected computer together with ability of performing different destructive actions, such as stealing confidential information or uploading other spywares. The following files were created in the system:

PWStroy Trojan

Posted: March 28, 2006 | Category: Trojans
PWStroy is a very dangerous and destructive trojan, which can perform two different types of harmful actions. First of all, this pest makes several critical changes in computer settings; these changes result in a full format of hard disk after computer is restarted. What is more, PWStroy can steal user's passwords and send them to the anonymous hacker. The following files were created in the system:

Unite Trojan

Posted: March 28, 2006 | Category: Trojans
Unite Trojan is a malicious password stealer, which usually sneaks into the computer as an attachment file from many suspicious e-mail letters. Once a careless user runs the infected file, Unite Trojan activates itself and starts logging user's keystrokes. In case an attempt of entering password is detected, this pest writes it into a special log file and sends it to the hacker. The following files were created in the system:

Sheehy Trojan

Posted: March 28, 2006 | Category: Trojans
Sheehy Trojan is a destructive spyware, which usually sneaks into the computer and tries to damage its critical components . In the result of this pest's activities, the infected computer can start working improperly or even become totally unusable. The following files were created in the system:

Pounds Trojan

Posted: March 28, 2006 | Category: Trojans
Pounds Trojan is quite a harmless spyware, which acts by simulating some kind of critical computer error. This technique isn't able to cause any serious troubles, but is tremendously annoying and always causes a loss of user's productivity. In the result of Pounds' activities a message box appears on the screen and the mouse pointer becomes unable to point anywhere around this box. Killing “virus.exe� process can easily terminate this effect. The following files were created in...

MIRC Abuser

Posted: March 28, 2006 | Category: Trojans
MIRC Abuser usually sneaks into the computer by pretending being a useful tool, but instead of performing useful actions it infects mIRC and allows the anonymous hacker to control the computer through it. The hacker becomes able to produce harmful actions and, what is more, use the infected machine as a DoS attack tool. The following files were created in the system:

Lornuke Trojan

Posted: March 28, 2006 | Category: Trojans
Lornuke is a very dangerous nuker, which is often being used by many hackers for decreasing target machine's performance. What is more, the anonymous hacker can also use the infected PC for nuking other PCs, which are using one subnet. The performance of infected machines can be degraded greatly, that's why it's strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

Dripper Trojan

Posted: March 28, 2006 | Category: Trojans
Dripper Trojan is a specific password stealer, which specializes in capturing passwords for dial-up Internet access. Once this spyware sneaks into the computer, it tries to log user's keystrokes and send them to the anonymous hacker, who is then able to use this private information for his or her own needs. The following files were created in the system:

Diagcfg Trojan

Posted: March 28, 2006 | Category: Trojans
Diagcfg Trojan is a malicious spyware, which harvests for specific pieces of data and sends them to the hacker. This data include IP address and information about connected hosts. Although there's nothing to worry about, because no passwords can be stolen, it is still strongly advisable to detect and remove this pest from the infected machine as soon as possible. The following files were created in the system:

Girl Gif

Posted: March 28, 2006 | Category: Trojans
Girl Gif is a dangerous backdoor trojan, which acts by logging user's keystrokes and sending mined information to the anonymous hacker. This common technique can give the hacker a free access to user's web accounts or other private resources. The following files were created in the system:

Danschl Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a primitive and simple trojan, which acts by deleting several files and creating some certain folders. Although this spyware doesn’t treat the computer's stability strongly, it's still recommended to get rid of it as soon as possible. The following files were created in the system:

Glitch Trojan

Posted: March 28, 2006 | Category: Trojans
Glitch Trojan is a malicious spyware, which usually infects the computer as an attachment from many suspicious e-mail messages. Once this happens, Glitch installs a hidden IRC client and waits for hacker's commands. The hacker can turn the computer into a powerful DoS attack tool, which would be able to send data to remote computers and temporarily disable them. The following files were created in the system:

Badcon Trojan

Posted: March 28, 2006 | Category: Trojans
Although this pest is quite old and able to damage only unpatched Windows 95 and 98 computers, it still can become a great danger for those users, who have no patches installed on their machines. Badcon Trojan corrupts several critical computer components; this technique causes often crashes and forces the infected computer to restart from time to time. The following files were created in the system:

Suffer Trojan

Posted: March 28, 2006 | Category: Trojans
Suffer Trojan is a harmless prank trojan, which performs different annoying actions. These actions consist of continuously opening CD-ROM and showing a black message box with a text 'Suffer...' inside it. This technique can often cause a loss of user's productivity, that's why removing this pest would be the best decision possible. The following files were created in the system:

TRex Trojan

Posted: March 28, 2006 | Category: Trojans
TRex Trojan is a malicious application, which pretends being a computer tool and waits for a careless user to run it. Once this happens, TRex connects to the specified Internet location and downloads another spyware from there. In case of success, the downloaded spyware starts acting by restarting infected PC. The following files were created in the system: