MaxSearch

Posted: March 28, 2006 | Category: Browser Hijackers
MaxSearch is a browser hijacker that changes Internet Explorer default start and search pages to sites on maxfind.com and maxifiles.com domains. Once executed, MaxSearch creates a directory, drops files in it and modifies the Windows registry in order to register itself as a browser plugin. A sidebar is also included in the MaxSearch toolbar installation. The following files were created in the system:

WinBo

Posted: March 28, 2006 | Category: Adware
WinBo is a typical adware spyware that downloads and shows undesirable commercial advertisements. It can secretly get into the computer while visiting some malicious web sites. The following files were created in the system:

SouthBeachTel

Posted: March 28, 2006 | Category: Dialers
SouthBeachTel is a typical dialer that connects your PC to the Internet through high-cost phone number using a modem. It accesses a predefined Internet resource. SouthBeachTel can get into the computer while visiting some web sites. The following files were created in the system:

Webcont

Posted: March 28, 2006 | Category: Dialers
Webcont is a dialer that connects your PC to the Internet through high-cost phone number using a modem. It accesses a predefined Internet resource on the webcont.net domain. Webcont erases the web browser's cache and history. The spyware can get into the computer while visiting some web sites. The following files were created in the system:

Elfrah PCSpy

Posted: March 28, 2006 | Category: Keyloggers
Elfrah PCSpy is not an actual spyware, but a legitimate commercial product. However, it can be used for obvious malicious purposes. Elfrah PCSpy records keystrokes and tracks user activity. It doesn't distribute itself must be manually installed. Elfrah PCSpy runs on every Windows startup. The following files were created in the system:

Relevancy

Posted: March 28, 2006 | Category: Spyware
Relevancy is a malware spyware that records user search queries and sends gathered data to a predefined web server. Relevancy can get into the computer along with some ad-supported software. It also can be manually installed. The following files were created in the system:

SOS

Posted: March 28, 2006 | Category: Viruses
SOS is an extremly dangerous macro virus that infects text documents created with Microsoft Word application. The spyware inserts the "Sign of the Scream" phrase and injects malicious code into every opened or newly created Word document. It also infects Microsoft Word templates and modifies its essential settings. SOS has even more dangerous payload. It removes critical computer files and formats the main hard disk. The following files were created in the system:

Joex

Posted: March 28, 2006 | Category: Trojans
Joex is a trojan that changes Internet Explorer default start page to a web site on the joyiex.com domain, disables the Windows Task Manager and modifies certain computer settings. The spyware has the ability to update itself via the Internet. The following files were created in the system:

Anquiro

Posted: March 28, 2006 | Category: Browser Plugins
Anquiro is a third-party Internet Explorer toolbar that tracks user browsing habits and changes default start page to a web site on the anquiro.com domain. Anquiro doesn't distribute itself and must be manually installed. Some ad-supported software may also add it to the computer. The following files were created in the system:

TwoSeven

Posted: March 28, 2006 | Category: Spyware
TwoSeven is a malware spyware that records keywords the user enters into popular Internet search engines. It sends gathered data to a predetermined web server. TwoSeven may secretly download and install third-party software. The threat doesn't spread and must be manually installed. It runs on every Windows startup. The following files were created in the system:

Mousey

Posted: March 28, 2006 | Category: Backdoors
Mousey is a backdoor that gives the remote attacker unauthorized access to a compromised PC. The spyware can be used to control infected computer, download and install malicious software, attack remote hosts and disable essential computer services. Mousey is able to distribute itself using known Windows vulnerability. The following files were created in the system:

KeyLover

Posted: March 28, 2006 | Category: Keyloggers
KeyLover is a commercial application that records user keystrokes and sends gathered data to a predefined e-mail address. Although KeyLover is a legitimate product, it can be used by hackers for obvious malicious purposes. The application comes with the uninstaller and must be manually installed. It runs on every Windows startup. The following files were created in the system:

Spy Lantern

Posted: March 28, 2006 | Category: Keyloggers
Spy Lantern is a commercial keylogger that tracks user activity, logs keystrokes, captures screenshots, records passwords and addresses of visited Internet sites. The application can save gathered data to a hard disk or send it out by e-mail. Spy Lantern must be manually installed. The keylogger uses files with random names, so it is very difficult to detect. It secretly runs on every Windows startup. The following newly produced Registry Values are: HKEY..\..\..\.. {RegistryKeys}...

Stealth Website Logger

Posted: March 28, 2006 | Category: Spyware
It is a commercial malware application designed to track user activity in the Internet. It can send logged data to a configurable e-mail address. Although Stealth Website Logger is not an actual spyware, its activity can severely violate user privacy. The risk must be manually installed. It secretly runs on every Windows startup and hides its active processes. The following files were created in the system:

Stealth Web Page Recorder

Posted: March 28, 2006 | Category: Spyware
It is a malware application that tracks user activity in the Internet, logs visited web sites, records passwords and captures e-mail messages. Collected data is stored on a local hard disk. Although Stealth Web Page Recorder is not an actual spyware, this freeware tool can be used to severely violate user privacy. The risk must be manually installed. It runs every time the user opens Internet Explorer web browser. The following files were created in the system:

UltraKeyboard

Posted: March 28, 2006 | Category: Keyloggers
UltraKeyboard is a commercial keylogger program that secretly tracks and records every keystroke made on your computer. UltraKeyboard may keep a log of all URLs visited, record emails and chats, and more. In most cases, UltraKeyboard is manually installed without the computer user's knowledge and comes with an uninstaller. Even though keyloggers can be used for legitimate reasons such as child monitoring, they are often used for malicious purposes by attackers to track personal information...

Wayphisher

Posted: March 28, 2006 | Category: Trojans
Wayphisher is a trojan designed for phishing purposes and theft of user sensitive information. It tricks the user by sending a web browser from financial web sites to predefined malicious Internet resources with very similar look. Wayphisher creates files, modifies the Windows registry and adds addresses of phishing sites into the computer Hosts file. This prevents the user from accessing legitimate banking sites. The following files were created in the system:

SP2Update

Posted: March 28, 2006 | Category: Adware
SP2Update is an adware spyware that monitors user activity in the Internet, logs addresses of visited web sites and records entered keywords. It sends gathered data to a predetermined web server. Collected information is used to receive and show relevant commercial advertisements. SP2Update can get into the computer along with some ad-supported software. The spyware runs on every Windows startup. The following files were created in the system:

Stingware Key Logger

Posted: March 28, 2006 | Category: Keyloggers
Stingware Key Logger is a commercial keylogger that monitors user activity and records all keystrokes. The application must be manually installed. It runs on every Windows startup. The following files were created in the system:

Microkos

Posted: March 28, 2006 | Category: Backdoors
Microkos is a dangerous backdoor that allows the remote attacker to have full unauthorized access to a compromised computer. The spyware can be used to manage files, install software, control PC hardware devices, modify computer settings, run hidden FTP server and change web browser settings. Microkos runs on every Windows startup. It uses files with random names. The following files were created in the system: