SpyGatorPro

Posted: March 28, 2006 | Category: Spyware
SpyGatorPro is a malware application that monitors user activity in the Internet, records keystrokes and takes screenshots. SpyGatorPro doesn't distribute itself and must be manually installed. You are highly adviced to get rid of this privacy risk as quickly as possible. The following files were created in the system:

Vipsearcher

Posted: March 28, 2006 | Category: Spyware
Vipsearcher is a malware spyware that tracks user Internet browsing habits and sends gathered data to a predefined web server. Vipsearcher doesn't spread and must be manually installed. The following files were created in the system:

Supaseek

Posted: March 28, 2006 | Category: Spyware
Supaseek is a malware spyware. It works as an additional Internet Explorer toolbar, which records keywords the user enters into its search field. Supaseek may access your e-mail account and steal its settings. The spyware can secretly get into the computer while visiting some unsafe web sites. The following files were created in the system:

Spy4PC

Posted: March 28, 2006 | Category: Spyware
Spy4PC is a malware application that records user keystrokes, takes screenshots and monitors user activity. It is not a spyware, but a legitimate spy tool, made by Spy4PC Software. However, it can be used by hackers to violate your privacy. Spy4PC runs on every Windows startup and hides from the user. Spy4PC comes with the uninstaller. The following files were created in the system:

Asdplugin

Posted: March 28, 2006 | Category: Dialers
Asdplugin is a dialer that connects your PC to the Internet using a high-cost phone number. It provides access to pornographic web resources. Asdplugin can be installed from many adult sites. The following newly produced Registry Values are: HKEY..\..\..\.. {RegistryKeys} HKEY_CURRENT_USERRemoteAccessInternetProfile=launchderbiz.com HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternetSettingsEnableAutodial=1 HKEY_LOCAL_MACHINEASDPLUGIN...

Beyond Keylogger

Posted: March 28, 2006 | Category: Keyloggers
Beyond Keylogger logs keystrokes, takes screenshots, tracks user activity in the Internet and records microphone sounds. The application sends gathered data to a predefined e-mail address. Beyond Keylogger is not an actual spyware. It comes with the uninstaller and must be manually installed. However, hackers may use it to spy on you, so you are highly adviced to get rid of this threat as soon as possible. The following files were created in the system:

Hidden Recorder

Posted: March 28, 2006 | Category: Spyware
Hidden Recorder takes screenshots of user activity at the predefined time intervals. The application runs on every Windows startup and hides from the user, so it is classified as a malware. However, it is a legitimate product, which still can be successfully used by hackers. Hidden Recorder must be manually installed. It comes with the uninstaller. The following files were created in the system:

LympexPCSpy

Posted: March 28, 2006 | Category: Spyware
LympexPCSpy is a malware application that captures screenshots of user activity. The spyware doesn't have additional dangerous functionality. LympexPCSpy main file is located in the default computer directory . The following files were created in the system:

Remote Boot Tool

Posted: March 28, 2006 | Category: Remote Administration Tools
Remote Boot Tool is a malicious RAT application that consists of server and client. The server runs on the compromised computer and can be used by the attacker to log off current user, reboot or shutdown a PC. The following files were created in the system:

Samkams

Posted: March 28, 2006 | Category: Backdoors
Samkams is a dangerous backdoor that gives the remote attacker unauthorized access to a compromised PC. It also collects computer information and sends it to a predefined web server. The following files were created in the system:

ABXToolbar

Posted: March 28, 2006 | Category: Adware
ABXToolbar is an adware application that shows plenty of annoying pop-up advertisements. It also changes the web browser's default start and search pages. The spyware works as an additional Internet Explorer toolbar. It can be secretly installed by some malicious web sites. The following files were created in the system:

EZToolbar

Posted: March 28, 2006 | Category: Browser Plugins
EZToolbar is an undesirable Internet Explorer plugin that tracks user browsing habits and sends gathered data to a certain web site. EZToolbar doesn't have dangerous payload. This risk can get into the computer while visiting some unsafe web sites. The following files were created in the system:

Riversoft

Posted: March 28, 2006 | Category: Adware
Riversoft is an adware application that shows commercial pop-up advertisements while you surf the Internet. The spyware doesn't spread and must be manually installed. It may arrive with some ad-supported software. The following files were created in the system:

Postbas

Posted: March 28, 2006 | Category: Dialers
Postbas is a dialer that connects your PC to the Internet using a high-cost phone number. The spyware offers access to pornographic web resources. Postbas doesn't spread and must be manually installed. It doesn't damage the computer, but its activity may result in enormous phone bills. The following files were created in the system:

Secup

Posted: March 28, 2006 | Category: Trojans
Secup is a trojan that shows fake security related messages. When the user clicks on such message the trojan opens malicious web site that quietly installs potentially unsafe software. Secup may serve undesirable commercial advertisements. The following files were created in the system:

Wowcraft

Posted: March 28, 2006 | Category: Trojans
Wowcraft is a trojan designed to steal passwords used in popular PC game "World of Warcraft" and send them to its author by e-mail. It also can record user keystrokes, download and install potentially unsafe software. The spyware infects essential computer files and terminates running security applications. The following files were created in the system:

Incef

Posted: March 28, 2006 | Category: Worms
Incef is an Internet worm designed only to spread. It doesn't have any dangerous payload. Incef spreads through file-sharing networks and via IRC channels using mIRC chat application. It creates multiple infected files, which names may vary and distributes them. The spyware alters essential mIRC settiengs. Incef runs on every Windows startup. The following files were created in the system:

Breatle

Posted: March 28, 2006 | Category: Worms
Breatle is an Internet worm that infects vulnerable PCs running Windows computer with unpatched security flaws. The spyware installs hidden FTP server, which gives the attacker unauthorized remote access to an infected PC. Breatle activity results in user privacy violation and possible computer damage. The following files were created in the system:

Jupillites

Posted: March 28, 2006 | Category: Trojans
Jupillites is a trojan that attacks predefined remote PCs and runs hidden proxy service on a compromised computer. It also collects computer information and sends it to certain web server. Jupillites can update itself via the Internet. The following files were created in the system:

MWSearch

Posted: March 28, 2006 | Category: Browser Plugins
MWSearch is a simple Internet Explorer search toolbar related to the morwillsearch.com domain. It offers a web search service, but also may show undesirable commercial advertisements. MWSearch doesn't have dangerous payload. It runs every time the user opens Internet Explorer. The following newly produced Registry Values are: HKEY..\..\..\.. {RegistryKeys} HKEY_CLASSES_ROOTMWSearch.StockBar HKEY_CLASSES_ROOTMWSearch.StockBar.1 HKEY_CLASSES_ROOTMWSearch.cfgwr...