Inor Trojan

Posted: March 28, 2006 | Category: Trojans
Inor Trojan is a malicious downloader, which acts by connecting to the specified Web server and downloading specific spyware from there. This pest was originally written for downloading and installing Qwe Trojan, but its code can be easily changed and Inor Trojan can infect the victim's computer with other pests. The following files were created in the system:

ProteBoy

Posted: March 28, 2006 | Category: Trojans
ProteBoy is a dangerous trojan, which specializes in deleting registry backups. These files are often in danger of being removed by this trojan: C:WindowsSysbckupRb00*.cab This action isn't a threat for computer's stability, but can cause several negative effects if combined with other spywares. The following files were created in the system:

Idly Trojan

Posted: March 28, 2006 | Category: Trojans
Idle Trojan is a malicious password stealer, which performs its destructive actions with the help of its specific key-logging algorithm. Idle Trojan can steal user's passwords for many messengers, Internet accounts or even dial-up access. After the hacker gets these passwords, he or she becomes able to use them for different purposes freely. The following files were created in the system:

Yinker Trojan

Posted: March 28, 2006 | Category: Trojans
Yinker Trojan is a malicious application, which acts by creating new user account with the name 'Yinker' and providing it with Administrator-level access. Although this technique isn't really destructive, it can seem quite annoying; that's why Yinker Trojan should be removed as soon as possible. The following files were created in the system:

GreatPage

Posted: March 28, 2006 | Category: Trojans
GreatPage is a very annoying trojan, which has no abilities of performing destructive actions. This pest acts by opening a new Web page and, in parallel with that, disabling mouse pointer. This technique can cause a serious loss of inexperienced users’ productivity, if only these users aren’t able to manipulate Web browser by keyboard. The following files were created in the system:

DCharge

Posted: March 28, 2006 | Category: Trojans
DCharge is a malicious application, which turns infected PCs into DoS attacks. These attacks have an aim of sending information to many Web servers in order to temporarily disable them. Although no negative effects can occur on the infected machine, it's still strongly advisable to get rid of it as soon as possible. The following files were created in the system:

FNK Trojan

Posted: March 28, 2006 | Category: Trojans
FNK is a simple, but very effective disk filler. This pest acts by simply creating many files and placing them into different folders. After this spyware fills all available disk space, it ends its activities and the infected machine starts experiencing performance problems. The following files were created in the system:

MsnPws Trojan

Posted: March 28, 2006 | Category: Trojans
MsnPws is a very dangerous backdoor trojan, which uses MSN messenger for performing its destructive actions. The anonymous hacker is able to send his or her commands through this messenger; these commands can make this spyware steal user's confidential data or damage many critical files. The following files were created in the system:

April Fool

Posted: March 28, 2006 | Category: Trojans
April Fool is a malicious spyware, which performs a set of annoying actions onto infected machine. For example, this pest renames the 'Inbox' folder of Outlook or Outlook Express to 'April Fool'. What is more, this pest is also able to modify several registry entries and cause slight computer instability. The following files were created in the system:

Guapeton Trojan

Posted: March 28, 2006 | Category: Trojans
Guapeton is a simple and not very destructive trojan. This pest acts by searching for icon files and deleting them. These actions are performed only after the user of infected PC accepts them. Although no serious damage can be made, it is still recommended to get rid of Guapeton as soon as possible. The following files were created in the system:

Noops Trojan

Posted: March 28, 2006 | Category: Trojans
Noops Trojan is a malicious spyware, which acts by deleting several critical computer files and terminating antiviral processes. After this happens, the infected PC becomes unable to resist different viruses, which can infect it freely. What is more, this pest makes user's Internet Explorer connect to www.porn.com from time to time. The following files were created in the system:

Ailati Trojan

Posted: March 28, 2006 | Category: Trojans
Ailati Trojan is a dangerous spyware, which specializes in removing critical computer files and folders. This pest uses its simple, but very effective algorithms for detecting these key components. In the result of this infection many critical errors and troubles can occur. The following files were created in the system:

Visages Trojan

Posted: March 28, 2006 | Category: Trojans
Visages Trojan is nothing more than a joke trojan, which isn't able to harm the infected PC seriously. This pest acts by simply spinning the floppy drive; this technique makes it produce some annoying noise. Although there is nothing to be afraid of, it is still recommended to get rid of this pest as soon as possible. The following files were created in the system:

Progent Trojan

Posted: March 28, 2006 | Category: Trojans
Progent is a malicious and very dangerous trojan, which acts as a typical password stealer. This pest uses its key logging technique for silently writing user's passwords into a log file. This file is always easily available for the hacker, who is able to use this private information for his or her specific purposes. The following files were created in the system:

Optix Killer

Posted: March 28, 2006 | Category: Trojans
Optix Killer is a very dangerous spyware, which usually acts together with other destructive pests. This spyware acts by disabling antiviral software and, with the help of this technique, helping other viruses and trojans to sneak into infected PC. All in all, Optix Killer is a very dangerous trojan, which should always be treated carefully and not allowed to sneak into PCs. The following files were created in the system:

Downloader.PSK

Posted: March 28, 2006 | Category: Trojans
Downloader.PSK is a dangerous spyware, which has one simple, but really dangerous action available to it. This pest connects to the specified server and downloads Backdoor.IRC.PSK from there. The downloaded pest is backdoor trojan, which provides the anonymous hacker with a remote access to the infected PC. The following files were created in the system:

Exit Windows

Posted: March 28, 2006 | Category: Trojans
Exit Windows is a dangerous trojan, which usually infects the computer as a script part from HTML-documents. Right after this pest infects the computer, it changes its settings, so the whole computer shuts down on every start-up. This is a very annoying effect, which can be removed only after starting the computer in Safe Mode. The following files were created in the system:

Stealther

Posted: March 28, 2006 | Category: Trojans
Stealther is a dangerous trojan, which acts by sneaking into the computer from many suspicious Internet resources and performing many actions. These actions include hiding many critical computer components, such as registry keys, files or processes. The following files were created in the system:

FWin Trojan

Posted: March 28, 2006 | Category: Trojans
FWin is a dangerous and very destructive trojan, which acts by performing critical changes in Windows registry. In case of success, these changes always result in serious computer instability; what is more, it is common for this pest to make the infected computer totally unusable and extremely hard to restore. The following files were created in the system:

Norio Trojan

Posted: March 28, 2006 | Category: Trojans
Norio Trojan is an annoying and quite dangerous spyware, which specializes in changing many computer settings. For example, Norio changes computer registry entries and Internet Explorer's settings; these changes result in continuous opening of porn sites and adding unwanted search bars to the IE. What is more, Norio Trojan can is also able to connect to different servers, download spywares from there and infect the victim's PC with them. The following files were created in the system: