Spyware.MSNTrackMon is a spyware program, created to stealthily log all Windows instant messaging conversations. Spyware.MSNTrackMon may be installed to your system without your knowledge or consent in order to violate your privacy. Spyware.MSNTrackMon is a serious attempt to interfere with your security and privacy and is recommended to be removed immediately.
Trojan.Agent.xtn is a nasty backdoor Trojan program. Once executed on your machine, Trojan.Agent.xtn provides a remote violator full access to your PC and any information stored on it. Your computer will become a proxy server and will be employed by a remote attacker who may use it for malicious purposes, including remote attacks. Trojan.Agent.xtn is a serious security risk and should be eliminated from your system immediately.
Adware.CPush is an unwanted and excessive adware program that installs on your machine as a BHO (Browser Helper Object). Adware.Cpush is designed to bombard your screen with large numbers of popup advertisements. This may disturb your Internet browsing experience and may result your system to perform more sluggish. Adware.CPush is a potentially unwanted and useless program that shouldn’t remain on your system.
Packer.Malware.NSAnti.J is a malicious program that employs NSAnti packing method, which is designed to masquerade the true nature of any software packed with it. Malware creators often use this tactic in order to distribute their malicious programs. Packer.Malware.NSAnti.J is not a legitimate or useful program and should be removed immediately.
Adware.Cinmus is an adware application designed to distribute popup adverts. In addition, Adware.Cinmus will also collect and transmit information on your Internet browsing patterns. It embeds into your browser as a Browser Helper Object (BHO) and can be difficult to manually remove.
Trojan.Banker-CIY is a malicious Trojan that belongs to the Banker Trojan family. Trojan.Banker-CIY may be secretly installed onto your system through browser security holes or via other nefarious mechanisms. Once executed, Trojan.Banker-CIY will monitor your searched keywords and will steal passwords to several major banking websites when you enter them in. Trojan.Banker-CIY will also provide the attacker with the details about your computer’s hardware. Trojan.Banker-CIY opens up a huge security hole on your system and is a very serious threat to the security of your personally identifiable information. Trojan.Banker-CIY will affect your financial data as well by stealing your online banking passwords.
Worm.Zhelatin.ml is an email worm that is designed to deliver itself as a spam email attachment. Once executed on your machine, the worm will use rootkit methods in order to avoid detection. Such methods are very tricky and may corrupt the legitimate control of an operating system and may hide running processes, system data or files from the user. Worm.Zhelatin.ml will seek to add your machine to an IRC Botnet, and will then use your PC’s resources to send spam emails to your contacts and any email addresses that can be found on your PC.
Porn-Dialer.GBDialer is a nasty pornographic dialer. Once installed on your system, Porn-Dialer.GBDialer will disconnect you from your dial-up ISP and reconnect you via an extremely expensive telephone number. As a result you’ll receive a huge phone bill. Porn-Dialer.GBDialer is reported to intentionally lead you to pornographic websites.
SpamTool.Agent.bt is a malicious program that infects victim’s computer through spam email attachments. SpamTool.Agent.bt may be also installed through ActiveX security holes and other illegal mechanisms. Once installed, SpamTool.Agent.bt will stealthily send spam emails to any email addresses that it can locate on your PC.
Worm.StormWorm is an extremely dangerous and rather intelligent worm. Worm.StormWorm can be very difficult to manually remove from your machine once you have caught it. Worm.StormWorm is designed to distribute itself via e-mail message that contains misleading content and a link to an electronic greeting card, postcard, news video, or similar content. Once the link in the message is pressed, Worm.StormWorm will employ the security holes on your browser to secretly install itself on your machine and await further instructions. Worm.StormWorm is reported to slow down your Internet speed.
Trojan.Zbot is a fairly generic backdoor Trojan infection that is closely linked to Mal/VB-AER and the Zeus Trojan , one of the most infamous malware infections. Since 2007, Trojan.Zbot has made headlines when Trojan.Zbot was used to infiltrate and steal information from the Transportation Department of the United States. Since March of 2009, Trojan.Zbot and the Zeus Trojan became widespread, infecting millions of computer from all around the world. ESG security researchers detected thousands of FTP servers of some of the most popular websites that were infected with the Zeus Trojan and Trojan.Zbot. Malware analysts estimate that the botnets associated with Trojan.Zbot cost billions of dollars every year and that a large percentage of phishing messages on Facebook and in spam emails are sent in order to spread malware associated...
Trojan.Peed.INS is created to infect your machine and open a conduit by which large amounts of adware and spyware can be secretly imported to your PC. Trojan.Peed.INS will also open up a large security hole on your system and will cause a serious threat to the security of your personal and financial information.
Trojan.Agent.cej is a backdoor Trojan application that creeps into the system with the help of other Trojans, through browser security exploits, or under other dubious circumstances. Once executed, Trojan.Agent.cej will copy itself to the Windows root directory so it could be launched every time the user turns his computer on. Trojan.Agent.cej will open up numerous backdoor security holes, allowing the remote attackers to control your computer, execute programs, download additional malware, and steal confidential personal data and credit card information. Trojan.Agent.cej is a severe threat to the safety and security of your personal and financial data, and should be removed immediately.
Backdoor.Padodor a is a backdoor Trojan that is designed to obtain unauthorized access to user’s machine. Usually, Backdoor.Padodor gets into your system through browser security exploits or other illicit and unethical mechanisms. Once executed, Backdoor.Padodor will hide itself deeply in the system and work in the background. Backdoor.Padodor may exploit vulnerabilities of installed programs or operating system and allow the remote attacker to gain full control over your PC. Backdoor.Padodor is a serious threat to the security of your machine; therefore we recommend to remove it as soon as possible.