ZenDown

Posted: March 28, 2006 | Category: Trojans
ZenDown is a destructive spyware, which acts by modifying computer registry by adding several values to it. These values make the Windows shutdown each time it is started. This technique makes it completely impossible to use Windows normally, that's why a careful attitude towards such spywares is always recommended. The following files were created in the system:

Delalot Trojan

Posted: March 28, 2006 | Category: Trojans
Delalot Trojan is an extremely dangerous and destructive Trojan horse, which specializes in removing all files from all hard drives. In case of this pest's success, all data would be lost and extremely hard to restore, that's why it is strongly recommended not to open any files you don't know. The following files were created in the system:

Porky Trojan

Posted: March 28, 2006 | Category: Trojans
Porky Trojan is a malicious destructive pest, which acts by sneaking into the computer from suspicious Internet resources and waiting for inexperienced user to run its main file. If this happens, Porky starts deleting all files on all hard disks immediately. The following files were created in the system:

PWL Steal

Posted: March 28, 2006 | Category: Trojans
PWL Steal is a dangerous hacker's utility, which acts by searching for *.PWL files on the infected PC . Once this pest finds such files, it connects to the hacker's PC and sends passwords there. This technique compromises the user's privacy greatly, that's why this pest should be removed from the infected computer as soon as possible. The following files were created in the system:

AVKiller Trojan

Posted: March 28, 2006 | Category: Trojans
AVKiller is a very destructive trojan, which specializes in killing antiviral applications. This means that AVKIller searches for antiviruses installed on the infected PC and, in case of success, tries to terminate their processes. If this happens, the infected PC loses its ability to resist spywares and can get infected with other viruses very soon. The following files were created in the system:

DSS Trojan

Posted: March 28, 2006 | Category: Trojans
DSS Trojan is a very annoying and destructive spyware, which acts in the following way: Firs of all, DSS installs a Web page onto infected PC and waits for some certain period of time. After that, it starts that code and connects to the Adult Web site. After that has happened, it tries to install a parasitic dialer onto infected machine. The following files were created in the system:

FatKill Trojan

Posted: March 28, 2006 | Category: Trojans
Although FatKill Trojan is quite old, it is still extremely dangerous even for modern computers. This spyware acts by changing File Allocation Table; this technique corrupts the file computer and, as a result of these actions, infected computer starts working improperly. It's strongly advisable to get rid of FatKill Trojan before it starts its actions. The following files were created in the system:

QQPass Trojan

Posted: March 28, 2006 | Category: Trojans
QQPass is a malicious application, which is extremely dangerous for Internet users from Asia, where the QQ messenger is popular. This spyware acts by infecting this messenger and stealing passwords from it. After this happens, QQPass Trojan writes passwords into qqlogin.txt file and sends it to the anonymous hacker. The following files were created in the system:

Humour Trojan

Posted: March 28, 2006 | Category: Trojans
Humour Trojan is a harmless spyware, which is only able to remove or hide several desktop icons, which are associated with some certain actions. Once this spyware is detected and removed from the computer, these icons will be showed correctly. The following files were created in the system:

Swporta Trojan

Posted: March 28, 2006 | Category: Trojans
Swporta Trojan is almost harmless parasitic trojan, which acts by changing Internet Explorer's home page to the adult web site. This pest's specific technique doesn't allow the user to restore this setting manually, that's why it's recommended to get rid of Swporta Trojan and after that change the home page back. The following files were created in the system:

Liquid Trojan

Posted: March 28, 2006 | Category: Trojans
Liquid Trojan is a prank trojan, which is still able to become a reason of many negative effects, such as the loss of user's productivity. This pest acts by creating a large number of text files in the Program Files folder. After this happens, Liquid Trojan restarts the infected PC. The following files were created in the system:

WidGet Trojan

Posted: March 28, 2006 | Category: Trojans
WidGet Trojan is a malicious application, which was written in Russia. This pest acts by harvesting the infected computer for passwords and logging user's keystrokes. After this spyware gets enough information, it starts using its own SMTP engine for sending these passwords to the e-mail server in Russia. This pest's activities are always a potent threat for user's privacy and security. The following files were created in the system:

Pandora Trojan

Posted: March 28, 2006 | Category: Trojans
Pandora Trojan is a very dangerous and extremely destructive spyware, which usually infects the computer from many Internet resources and waits for the specified date to start its payload . On this specified date, Pandora Trojan tries to format the hard disk or remove several critical folders . The following files were created in the system:

Starfi Trojan

Posted: March 28, 2006 | Category: Trojans
Starfi Trojan is a dangerous password stealer, which specializes in stealing user's MSN accounts. This pest logs user's keystrokes and, in case of success, sends this information to the hacker. If there is no MSN messenger installed on the infected machine, this trojan will do nothing. The following files were created in the system:

SharesEnable Trojan

Posted: March 28, 2006 | Category: Trojans
SharesEnable Trojan is a dangerous spyware, which is able to detect the main Windows folder and share it; this technique makes it possible for the hacker to modify files from that folder, remove them or upload new ones. SharesEnable Trojan's activities can result in serious troubles, such as computer instability or the loss of important data. The following files were created in the system:

Crabox Trojan

Posted: March 28, 2006 | Category: Trojans
Crabox Trojan is a specific trojan, which usually doesn't harm the infected machine, but uses it as an attack tool for damaging play.mp3.com Web site. This can be achieved by continuously sending requests to this site from different infected PCs. This site can inform you, that your computer is infected with Crabox Trojan, by sending you a message. The following files were created in the system:

Adnap Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application acts by simulating Panda Antivirus and, in parallel with that, trying to connect to many sites from www.geocities.com. What is more, Adnap Trojan modifies autoexec.bat file; this technique makes it possible to run this pest each time Windows is started. The following files were created in the system:

WinNuke Trojan

Posted: March 28, 2006 | Category: Trojans
WinNuke is a malicious nuke trojan, which specializes in damaging infected PC by deleting or corrupting its critical files. In case of this pest's success, the infected computer may start working improperly or even become totally unusable. It's always recommended to have your antiviral software updated in order to prevent WinNuke from getting into your PC. The following files were created in the system:

Rebohon Trojan

Posted: March 28, 2006 | Category: Trojans
This pest, which was written in Visual Basic, can damage only Windows XP operating computers. This can be done by changing several critical computer components and making the computer shutdown right after the user starts it. The following files were created in the system:

LoveAd Trojan

Posted: March 28, 2006 | Category: Trojans
LoveAd is quite a primitive and harmless trojan, which acts through the Internet Explorer. If the infected PC gets an access to the Internet, this spyware starts connecting to many Web sites. This technique is really annoying, that's why removing LoveAd as soon as possible would be the best decision available. The following files were created in the system: