Maocal

Posted: March 28, 2006 | Category: Trojans
Maocal is a trojan designed to steal sensitive user information and log keystrokes. It starts automatically on each computer startup and works in background. Maocal collects passwords and other valuable data and sends it to its home servers. It can update itself via the Internet. Maocal doesn't damage the computer, but severely violates user privacy. Consider removing it immediately. The following files were created in the system:

Tdiserv

Posted: March 28, 2006 | Category: Worms
Tdiserv is a dangerous worm with many malicious functions. Usually this parsite spreads in local networks. The following files were created in the system:

Cabreck

Posted: March 28, 2006 | Category: Worms
Cabreck is a relatively harmless worm designed to spread in local networks. It has no dangerous payload. Nevertheless, it can severely decrease overall computer performance and Internet connection speed. Cabreck modifies the registry and creates many copies of itself that are distributed to shared network drives. Infected files have different names. The spyware starts automatically on every Windows startup. The following files were created in the system:

Zlob

Posted: March 28, 2006 | Category: Backdoors
Zlob Zlob is a large family of multiple-component trojans that use several threats in coordination to hijack your web browsers and install malicious programs. Zlob is particularly closely-associated with rogue security applications like Windows AV Component that create fake infection warnings and other inaccurate system alerts. The goal of any rogue security program is to steal your credit card information and money, and Zlob assists them in that endeavor through a variety of methods that attack...

NetVision

Posted: March 28, 2006 | Category: Dialers
It is a dialer with typical functionality. It gets installed when visiting certain web sites. NetVision accesses the registry and modifies essential computer and networking settings, so it could be started on every Windows startup and used as the default Internet connection service. The dialer doesn't compromise the computer, but connects to the Internet via high-cost foreign or local telephone numbers. Even several minutes in the Internet may result in enormous phone bills. Consider using...

PlayGames

Posted: March 28, 2006 | Category: Dialers
It is a dialer with typical functionality. It gets installed when visiting certain web sites. On the first run PlayGames connects to the Internet using a high-cost telphone number and opens a certain web site. It doesn't alter critical computer settings. This dialer is relatively harmless, but its activity may result in enormous phone bills. Consider using anti-malware software in order to get rid of this risk. The following files were created in the system:

Floodblack

Posted: March 28, 2006 | Category: Trojans
Floodblack is a trojan that gives the attacker remote unauthorized control over an infected PC. It runs on every Windows startup and remains hidden in background. Floodblack contacts predefined web server to receive commands from the hacker. These commands allows to execute any local application, modify the computer, attack remote PCs or show annoying messages. Floodblack can severely damage the computer, violate user privacy, decrease overall computer performance and Internet connection...

Raidys

Posted: March 28, 2006 | Category: Trojans
This is a trojan that steals valuable user information, logs keystrokes and gives the attacker remote unauthorized access to a compromised PC. Raidys overwrites critical computer files with its copies and modifies the registry, so it could be started on every Windows startup. It places infected files into C:WindowsSystem, C:WindowsSystem32 or C:WinntSystem32 directories. It also uses special technique to hide its active processes and prevent Windows OS and some firewall applications from...

AUNPS

Posted: March 28, 2006 | Category: Adware
AUNPS is a typical adware application. Some malicious web sites can secretly install it to vulnerable computers. AUNPS starts automatically on every Windows startup and stays hidden in background. From time to time it shows annoying commercial advertisements in opened Internet Explorer windows. Such activity noticeably obstructs your usual web surfing. Use anti-malware application to completely remove AUNPS from the computer or manually kill its processes and remove corresponding files...

AdServerNow

Posted: March 28, 2006 | Category: Adware
AdServerNow is a typical adware application that shows annoying advertisements in opened Internet Explorer windows. Several commercial web sites secretly install this threat to vulnerable computers of their visitors. AdServerNow doesn't damage a PC, but can severely decrease Internet connection speed and obstruct usual web surfing. It has the ability to update itself via the Internet. The following files were created in the system:

Sheldor

Posted: March 28, 2006 | Category: Trojans
Sheldor is a trojan with adware functionality. The following files were created in the system:

Kassbot

Posted: March 28, 2006 | Category: Worms
Worm Kassbot, also known as Nanspy, spreads in local area networks. It infects PCs running vulnerable Windows version with unpatched security holes. Kassbot modifies essential computer settings to block access to certain web sites. It contacts predefined web servers to receive commands from the attacker and download updates. It also compromises other vulnerable network PCs. Kassbot is relatively easy to remove. It depends on a single executable located in the default computer folder and one...

WinProtect

Posted: March 28, 2006 | Category: Adware
WinProtect is an adware application that works in the Taskbar and shows fake messages saying that "Your PC might be at risk". When a user clicks on such message WinProtect opens a site of certain anti-malware vendor. The application starts automatically on every Windows startup and shows annoying advertisements from time to time. Consider using reputable anti-malware software to completely remove this spyware. The following files were created in the system:

WhileUSurf

Posted: March 28, 2006 | Category: Adware
WhileUSurf is a malicious adware application that shows numerous commercial advertisements. It also can corrupt Internet Explorer and severely decrease overall computer performance. It can be secretly installed on some suspicious web sites. WhileUSurf places its files into the default computer folder and modifies the registry, so it could be started automatically on every computer startup. The following files were created in the system:

WeirdOnTheWeb

Posted: March 28, 2006 | Category: Adware
WeirdOnTheWeb is a typical adware application that shows many annoying advertisements and pop-ups with commercial content. It is able to track user activity in the Internet. WeirdOnTheWeb can be secretly installed on some malicious web sites. This spyware starts automatically on computer startup and works in background. The following files were created in the system:

Vanish

Posted: March 28, 2006 | Category: Adware
Vanish is an adware application that shows commercial advertisements and changes default start and search pages to predefined addresses. It also contacts certain web server, downloads and installs suspicious third-party software. Consider using good anti-malware application in order to get rid of this threat. The following files were created in the system:

Myftu

Posted: March 28, 2006 | Category: Trojans
Myftu is a trojan designed to register its victim to Japanese porn service without asking for his permission. The trojan can show a message in Japanese related to a porn service. It also scans the computer for e-mail addresses, collects them and sends to predefined web servers. Myftu modifies the Windows registry and drops infected files into the C:Program Files folder. It doesn't compromise the computer, but violates user privacy and must be removed as soon as possible. The...

AdsInContext

Posted: March 28, 2006 | Category: Adware
AdsInContext is an illegal advertising application that downloads commercial advertisements and shows them in Internet Explorer windows. It drops its files into the computer directory and randomly named folder located in the Windows default temporary folder . It also modifies the Windows registry, so it could run along with the web browser. AdsInContext is able to update itself via the Internet. It is related to adsincontext.com domain. The following files were created in the system:

EnhanceMSearch

Posted: March 28, 2006 | Category: Adware
EnhanceMSearch is an adware application that shows relevant commercial advertisements based on user interests. It tracks user activity in the Internet and reads keywords entered into the search fields of several popular Internet search services like Google. The spyware starts automatically along with the Internet Explorer web browser and secretly works in background. Its files are located in the main computer directory . The following files were created in the system:

Ulubione

Posted: March 28, 2006 | Category: Dialers
Ulubione is a dialer that connects to the Internet and accesses adult resources via high-cost phone number. It doesn't spread by itself, the user installs it manually. Ulubione starts on every Windows startup. Its files can be found in following default computer directories: C:Windows or C:Winnt and C:WindowsSystem, C:WindowsSystem32 or C:WinntSystem32. The following files were created in the system: