Gargafx

Posted: March 28, 2006 | Category: Trojans
Gargafx is a trojan that executes potentially harmful arbitrary files secretly downloaded from a predetermined web server. The spyware hides its presence in the computer by injecting malicious code into legitimate computer processes. Gargafx is able to automatically reinstall itself. The threat runs on every Windows startup. The following files were created in the system:

Dranus

Posted: March 28, 2006 | Category: Viruses
Dranus is a dangerous macro virus that infects Microsoft Word documents and attempts to destroy the entire computer. The spyware modifies Microsoft Word essential security settings and disables its virus protection feature. It also turns off certain Windows security functions and changes the computer clock time. Dranus removes all executable files located in the root of the main hard disk and main computer directory , destroys all software installed into C:Program Files folder and wipes out...

Ludeno

Posted: March 28, 2006 | Category: Viruses
Ludeno, also known as Lunedo, is a dangerous macro virus that infects Microsoft Word documents and attempts to destroy the entire computer and remove user sensitive information. The spyware modifies Microsoft Word essential security settings, disables Windows Firewall and blocks access to standard Windows tools such as the Task Manager and Registry Editor. It also alters some computer and web browser settings. Ludeno removes archives, documents, executables, configuration and multimedia files...

ZioCom

Posted: March 28, 2006 | Category: Adware
ZioCom is an adware spyware that shows undesirable commercial advertisements. The threat tracks user activity, records addresses of visited web sites and collects information about the computer. It sends gathered data to a predetermined remote host. ZioCom can download from the Internet and execute potentially harmful arbitrary files. The spyware runs on every Windows startup. The following newly produced Registry Values are: HKEY..\..\..\.. {RegistryKeys}...

Reoxtan

Posted: March 28, 2006 | Category: Trojans
Reoxtan is a dangerous trojan that steals user sensitive information such as many login names and passwords, networking settings, computer and PC information. It also records addresses of visited web sites, tracks user Internet activity and records keystrokes. Reoxtan transfers gathered data to a predetermined remote host. It may download additional instructions or files. The spyware disables Windows Firewall and alters computer security settings. It may act as a hidden proxy service....

Desktop Surveillance

Posted: March 28, 2006 | Category: Keyloggers
Desktop Surveillance is a commercial monitoring product that tracks user activity, logs all keystrokes, continuously takes screenshots, captures e-mails and online chat conversations. Gathered data is saved to a hard disk. The application is able to block certain Internet resources, software or computer functions and turn off a PC without notifying the user. Desktop Surveillance must be manually installed. It is able to hide its active processes. The software runs on every Windows startup....

Advanced Computer Monitor

Posted: March 28, 2006 | Category: Keyloggers
Advanced Computer Monitor is a commercial PC surveillance application that can be used to track user activity, log all his keystrokes, take screenshots and record addresses of visited web sites. Gathered data can be sent to a configurable e-mail address or uploaded to a predefined FTP server. Advanced Computer Monitor must be manually installed. It is able to hide its presence in the computer by disabling certain Windows utilities such as the Task Manager. The softwares runs on every Windows...

Inetex

Posted: March 28, 2006 | Category: Browser Hijackers
Inetex is a browser hijacker that sends the user to pornographic and other undesirable web sites. The spyware is bundled with certain ad-supported software. It can also be manually installed. Inetex uses files with random names. It runs every time the user starts a web browser. The following newly produced Registry Values are: HKEY..\..\..\.. {RegistryKeys} HKEY_CLASSES_ROOThttpshellopencommand[randomfilename] HKEY_CLASSES_ROOThttpshellopenddeexecApplicationInetex...

Margoc

Posted: March 28, 2006 | Category: Adware
Margoc is an adware spyware that shows undesirable pop-up advertisements. The threat may contact a predetermined remote server and receive additional instructions. Margoc must be manually installed. It loads every time the user starts a web browser and can silently run on Windows startup. The following files were created in the system:

SearchNew

Posted: March 28, 2006 | Category: Browser Hijackers
SearchNew is a browser hijacker that changes Internet Explorer default home and search pages and blocks access to Microsoft search engine. It also adds bookmarks to the web browser's Favorites menu. The threat is bundled with some ad-supported software. It can also be manually installed. SearchNew automatically runs on every Windows startup. The following files were created in the system:

Theals

Posted: March 28, 2006 | Category: Worms
Theals is a dangerous multifunctional Internet worm that distributes itself by e-mail and infects network PCs running Windows operating computer with unpatched security vulnerabilities. The spyware arrives in malicious e-mail messages with attached password protected archives containing the worm. A typical message includes an image with a password, which is required to open an archive. Once the user unpacks an archive, Theals secretly installs itself to the computer. It starts to search for...

Eziin

Posted: March 28, 2006 | Category: Browser Hijackers
Eziin is a browser hijacker that changes the Internet Explorer default home page to the eziin.com site. It may modify some web browser security settings. Eziin must be manually installed. It automatically runs on every Windows startup. The following files were created in the system:

Powered Keylogger

Posted: March 28, 2006 | Category: Keyloggers
Powered Keylogger is a commercial PC surveillance application that tracks user local and Internet activity, logs all keystrokes and mouse clicks, takes screenshots, captures all outgoing and received e-mail messages and records passwords. Gathered data can be silently sent to a configurable e-mail address. Powered Keylogger hides all its files and folders and therefore is very difficult to detect and remove. The software automatically runs on every Windows startup. It works as a computer...

Fastsearchweb

Posted: March 28, 2006 | Category: Adware
Fastsearchweb is an adware spyware that shows undesirable commercial advertisements and modifies essential Internet Explorer settings. The threat can get into the computer while visiting some insecure web sites. Fastsearchweb registers itself as a web browser add-on and therefore runs every time the user starts Internet Explorer. The following files were created in the system:

GatorClone

Posted: March 28, 2006 | Category: Adware
GatorClone is an adware spyware that downloads and shows undesirable pop-up advertisements while surfing the Internet. It may receive additional instructions from its controlling server. GatorClone must be manually installed. It automatically runs on every Windows startup. The following files were created in the system:

Ssppyy

Posted: March 28, 2006 | Category: Keyloggers
Ssppyy is a powerful commercial keylogger that tracks user activity, logs all keystrokes, takes screenshots, captures online chat conversations and webmail messages, records passwords and addresses of visited web sites. Gathered data can be sent to a configurable e-mail address. The software allows the remote person controlling it download, upload, remove and execute arbitrary files. Ssppyy can be remotely uninstalled. The keylogger can be downloaded from the official web site. It also can be...

Remote Password Stealer

Posted: March 28, 2006 | Category: Spyware
Remote Password Stealer is a commercial spy application that silently records all user passwords and sends the log to a configurable e-mail address. The threat steals Windows, Internet Explorer, instant messenger, e-mail, FTP, dial-up connection and other passwords. The software must be manually installed. It secretly runs on every Windows startup. Remote Password Stealer has a so-called self-destructing feature that allows the person controlling the application remotely uninstall it....

PC Watch

Posted: March 28, 2006 | Category: Keyloggers
PC Watch is a typical commercial keylogging tool that records all user keystrokes and captures screenshots. The application doesn't have any additional functionality. It must be manually installed. PC Watch automatically runs on every Windows startup. The following files were created in the system:

WildJP

Posted: March 28, 2006 | Category: Dialers
WildJP is a dialer that connects a compromised PC to the Internet by dialing a premium rate phone number using a modem. WildJP can get into the computer while visiting some insecure web sites. The following files were created in the system:

Hugesot

Posted: March 28, 2006 | Category: Backdoors
Hugesot is a backdoor that gives the remote attacker unauthorized access to a compromised PC. The malicious person can download, upload and execute arbitrary files and manage the entire computer using a command shell. Hugesot also contacts predetermined remote servers, downloads and runs its additional components and other dangerous spywares. The threat collects computer information and sends it out. Hugesot automatically runs on every Windows startup. The following files were...