RemoteNC

Posted: March 28, 2006 | Category: Backdoors
RemoteNC is a backdoor that gives the attacker unauthorized remote access to the infected PC. RemoteNC allows to execute commands, run applications, manage files and gain control over the entire computer. The backdoor affects only NT, 2000 and XP versions of Windows OS. The following files were created in the system:

Remoter

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

RemoteStartProgram

Posted: March 28, 2006 | Category: Remote Administration Tools
RemoteStartProgram is a RAT tool designed to run softwares on remote PC. It is comprised of server and client. The server runs in the remote computer. RemoteStartProgram is not a spyware, but can be used by hackers to perform malicious actions. You should get rid of its server part. The following files were created in the system:

Remove

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

Retard

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

Revenger 0.2

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

ReVerb 1.4

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

Revrs

Posted: March 28, 2006 | Category: Backdoors
Revrs is a dangerous backdoor that gives the attacker full remote unauthorized access to a compromised PC. The hacker can execute different commands, run applications, record user keystrokes, manage files, modify computer settings, download and install additional software, steal user sensitive information, control a PC and its devices. Revrs stores its files in C:WindowsSystem or C:WinntSystem directory. It runs on every Windows startup. The backdoor has the ability to update itself via the...

Backdoor.Nucledor

Posted: March 28, 2006 | Category: Backdoors
This backdoor, as majority of these pests, consists of a server and a client application. Server writes itself into the Windows folder as a file nwc.exe, and then a hacker can get access to your PC remotely. The following files were created in the system:

Backdoor.Lithium

Posted: March 28, 2006 | Category: Backdoors
A quite dangerous backdoor. A server application writes itself to your PC, and then a hacker can get remote access to it. Connects to your PC through 31416 or other port. The following files were created in the system:

Webservect2

Posted: March 28, 2006 | Category: Backdoors
A relatively new backdoor application, which is dangerous to your PC. A server application writes itself to your PC, and then a hacker can get remote access to it. A client application is designed as a simple web-browser page. The following files were created in the system:

XConsole beta

Posted: March 28, 2006 | Category: Backdoors
Although in the name of the spyware you see "beta", it is a very dangerous application. It can make many damage to your PC, starting with remote connection and finishing with stealing your passwords. Basically XConsole Beta is classified as a backdoor application, but also it can be found in the internet databases as a trojan or password cracker or other type of spywares. The performance is as follows: a server application writes itself to your PC, and then a hacker can get remote access to...

Trojan Puper E

Posted: March 28, 2006 | Category: Trojans
Once executed Puper-E inserts itself into the Explorer.exe and is be able to run automatically when Windows starts up modifies registry. Also it may create some .ini related to itself. The following files were created in the system:

TAFbar

Posted: March 28, 2006 | Category: Spyware
TAFbar is a web search bar and pop-up blocker. This unwanted application runs along with the Internet browser and collects user sensitive personal information. TAFbar logs search queries, browser type, network settings and other similar data. Then it sends gathered data to commercial web sites and uses it to show many advertisements. Although TAFbar doesn't compromise the computer, it can be used in illegal activities. You are highly adviced to uninstall this pest from the computer using...

MyTob

Posted: March 28, 2006 | Category: Worms
Mytob is a quite dangerous mass-mailing worm that uses its own SMTP engine to send an email to addresses that it gathers from the infected computer. The worm composes connected and meaningful messages, attaches infected files and sends them to e-mail addresses, gathered from local files and accounts. It blocks access to security-related web sites and terminates running security software. The subject of the infected mail will be any one of the following: (Blank Subject) hi hello...

Wiretap

Posted: March 28, 2006 | Category: Worms
Wiretap runs in background and spies on a user. It logs keystrokes, monitors user actions, tracks his activity in the Internet, records executed applications, chat conversations, etc. Wiretap is published by www.wiretap.pro. It appears to be a legitimate application. However, attackers can use it to compromise your computer and violate your privacy. It is highly recommended to install and use malware removal tools in order to get rid of Wiretap. The following files were created in...

Wintective

Posted: March 28, 2006 | Category: Spyware
Wintective malware application starts automatically on every computer startup and remains hidden in background. It logs keystrokes, tracks user activity in the Internet and takes screenshots. Wintective sends gathered data to certain e-mail address. This spyware can severely violate your privacy and harm your PC. You are highly adviced to use malware removal tools in order to completely get rid of Wintective. The following files were created in the system:

MediaPass

Posted: March 28, 2006 | Category: Adware
MediaPass is a quite simple, but effective adware application. It starts automatically on every PC startup and secretly runs in background. It monitors user Internet activity, sends gathered data to its home servers, receives and shows annoying advertisements and other commercial information. MediaPass can be downloaded from www.windupdates.com. Do not install this application! The following files were created in the system:

Derbiz

Posted: March 28, 2006 | Category: Dialers
Derbiz is a dialer, published by DerBiz.com. Vendors say that Derbiz provides anonymous access to the Internet and extra resources, including adult and games sites, etc. The application requires a modem and connects through expensive local and foreign phone numbers. It starts automatically on every computer startup, changes default networking settings. It also modifies essential web browser settings without asking for user permission. Derbiz doesn't harm the computer, but may result in...

Maroot

Posted: March 28, 2006 | Category: Trojans
This is a dangerous trojan that infects critical computer files and modifies essential computer settings. It starts automatically on each computer startup and works in background. Maroon steals user passwords, account information, other sensitive data and sends it to the attacker. It also can download and install malicious software and perform other harmful actions. Use antivirus tools and advanced malware remover in order get rid of Maroot and protect your privacy. The following...