Database Updates IE Defender, SunshineSpy, AdwareCops, more - SpyHunter...

IE Defender, SunshineSpy, AdwareCops, more - SpyHunter Update v.6.81

By GoldSparrow in Database Updates

SpyHunter Spyware Definitions Update: v.6.81 (10/30/2007)
SpyHunter Latest Program Update: v.2.9.5018

IE Defender

IE Defender is classified as a rogue anti-spyware application because of its misleading and aggressive advertising practices. IE Defender is a member of the and its creators and their marketing affiliates propagate and install IE Defender's rogue anti-spyware application through a download that is bundled with a Trojan generated by a Browser... more

SunshineSpy

SunshineSpy is a rogue anti-spyware application. It is aimed at tricking the user into believing that his or her system is infected with spyware. This is accomplished by presenting the user with a number of fake security alerts, pop-ups and desktop wallpaper swaps. The reason for this masquerade is persuading the user to buy the full version... more

AdwareCops

AdwareCops is also known as BPS AntiSpyware Remover. It is classified as rogue anti-spyware application. In most cases it is secretly downloaded to your computer by a resident trojan or thru a security hole of your browser. The program then begins presenting the user with numerous fake security alerts in its attempt to persuade him or her to... more

Scan and Repair Utilities 2007

Scan & Repair Utilities 2007 is a fake spyware removal tool that is designed to get into the computer through browser security exploits, Trojans, or under dubious circumstances without your knowledge and consent. Once it is executed, Scan & Repair Utilities 2007 will irritate you with fake warning messages claiming that your system security is... more

Worm.Storm

Worm.Storm is a Trojan application that secretly gets into the system and turns it into a proxy. This allows the remote attacker to get full control over your computer and perform various malicious activities. For instance, after infecting your PC with Worm.Storm the hacker may use your computer for relaying spam emails and perform attacks on... more

Trojan.Zapchast

Trojan.Zapchast is a Trojan designed to hijack and infect your PC and steal personal information. Trojan.Zapchast may open a backdoor through which a remote attacker can break into your computer or use it for malicious reasons, including sending spam emails via your PC or launching attacks on remote computers. In addition, Trojan.Zapchast places... more

Keylogger.MGShadow

Keylogger.MGShadow is a spyware application designed to record all activity on your computer. Once executed, Keylogger.MGShadow will log all your keystrokes, your surfing habits, conversations and even email messages that you get. Moreover, it may be configured to take screenshots regularly. Keylogger.MGShadow collects all the data and sends it... more

Trojan-Downloader.VB.ajz

Trojan-Downloader.VB.ajz is a malicious Trojan application that installs onto your PC without your knowledge and permission. Once it is installed, Trojan-Downloader.VB.ajz will open a large security hole on your machine through which other malicious applications can be installed. This parasite can inject itself into system processes via rootkit... more

Backdoor.Hupigon.mqe

Backdoor.Hupigon.mqe is a backdoor Trojan designed to get into your computer through browser security holes or via other illicit and unethical mechanisms. Once executed, Backdoor.Hupigon.mqe will give the remote attacker a full control over your machine and all the data stored on it. Usually Backdoor.Hupigon.mqe allows the hacker to use your... more

BPS Remover

BPS Remover is a fake anti-spyware program that is often downloaded and installed by a Trojan, through browser security exploits, or via other illicit mechanisms. Once it is installed, BPS Remover will show notifications of imaginary security and privacy risks in its attempts to trick the user into purchasing the commercial version of the... more

Trojan.Small.AL

Trojan.Small.AL is a Trojan application created to hijack and infect your PC and to open a security hole as well, so additional malicious software programs can be imported to your computer. Trojan.Small.AL is a real danger to your personal and financial data, because it steals your personal information and passwords and sends it to the third... more

Backdoor.Beastdoor.206.a

Backdoor.Beastdoor.206.a is a backdoor Trojan that is a serious threat to your sensitive information stored onto your computer. Usually Backdoor.Beastdoor.206.a infiltrates computer systems with the help of browser security exploits and other unethical mechanisms. Once it is installed, Backdoor.Beastdoor.206.a will give the remote attackers full... more

Backdoor.Prorat.h

Backdoor.Prorat.h is a nasty backdoor Trojan designed to creep into the system through browser security exploits or under dubious circumstances without your knowledge and consent. Once it is installed, Backdoor.Prorat.h will open up a huge security loophole on your machine through which a remote attacker will get a full control over your PC.... more

Backdoor.Satan

Backdoor.Satan is malicious backdoor Trojan that is created to hijack your computer and provide a remote attacker with a full access to your machine. Once it is installed, Backdoor.Satan will open up a huge security loophole through which the hacker will be able to control your machine and steal all the personal and financial information stored onto your PC. Backdoor.Satan is a serious danger to the security of your sensitive information and we recommend to remove it immediately. more

Backdoor.WinCrash.a

Backdoor.WinCrash.a is a Trojan Backdoor application which creeps into your PC through browser security exploits without your knowledge and consent. Once executed, Backdoor.WinCrash.a will allow the remote attacker to connect to your machine and gain full control over it. Then the hacker is able to steal or destroy your sensitive data stored... more

Trojan.Gromp.b

Trojan.Gromp.b is a trojan horse program, once launched on your computer it will use its rootkit features to further infect your system. Afterwards it will open up a backdoor, thru which a number of other malicious applications may be downloaded onto your pc. This program is considered a high level threat and is to be removed immediately. more

Constructor.MicroJoiner

Constructor.MicroJoiner is an application, designed to build various malware programs. The program causes a risk, as very often such programs contain a portion of some malicious codes. more

Worm.Zlybot

Worm.Zlybot spreads through computer networks by exploiting computers with weak security. After successfully infecting your machine, Worm.Zlybot will scan it for email addresses and send its copy to all addresses found. The worm is also known to download additional spyware or adware onto the victim machine and to compromise system stability and... more

Trojan-Dropper.Agent.qw

Trojan-Dropper.Agent.qw is a so-called trojan downloader or dropper. Its main function is to unnoticeably infect your system and start downloading additional malware onto your computer. This program is considered to be a high risk security threat as it also sabotages Windows security settings and therefore allows further infections. more

Trojan.Dialer.qn

Trojan.Dialer.qn is designed to infect your system by exploiting various browser security holes or by using other secretive techniques. Once on your system it will drop your dialup connection and re-dial, using another phone number. This will increase your calling costs and double or triple your phone bill. more

Virus.Virut.ak

Virus.Virut.ak is designed to infect .exe and .scr files, once it loaded into memory it will infect all subsequently launched .exe and .scr files. Additionally, the virus opens up backdoor, thereby allowing remote malicious individuals to gain full access to your machine and use it as a proxy for various illegal activities. Virus.Virut.ak... more

Trojan-Downloader.Agent.ejh

Trojan-Downloader.Agent.ejh is designed to covertly infiltrate the victim machine and start downloading various spyware and adware applications onto it. This trojan poses a significant threat to your sensitive information. more

Trojan-Downloader.Agent.elb

Trojan-Downloader.Agent.elb is a trojan horse program. It infects your computer by exploiting various browser vulnerabilities and embeds itself in your system. Then it use your internet connection to download additional malware programs to your machine. It also gathers data on your browsing habits and leaks them to a remote server. more

Anti Spy Guard 2007

This is a fake spyware removal tool. The main purpose of this program is to trick the user into believing that his or her machine is infected with spyware and that the best solution available is the payed version of the program. Additionaly Anti Spy Guard 2007 may compromise system stability and performance. more

SpywareZapper

SpywareZapper is a fake spyware removal application. It is a newer version of BPS AntiSpyware Remover. Both of these programs use deceptive tactics in order to persuade the user to buy full versions of the program. Both of them are most often downloaded and installed by a resident trojan or thru a security hole of the users browser. In addition... more

Trojan.Downloader-RA

Once launched on the victim machine this trojan will use the existing Internet connection in order to download and install additional malware. more

Trojan.Xorpix
TrojanProxy.Win32-Agent
Trojan.Tibs
Zlob.Trojan
Backdoor.PoisonIvy
Trojan.Adload
HotBar
180Solutions.Zango
MalWarrior 2007
PWSteal.LdPinch
Trojan.KillAV
Gromozon/LinkOptimizer
Virtumonde
PCSecureSystem AVSystemCare
WinFixer
Trojan.StartPage
Trojan.FavAdd
AntiSpyware
SmartShopper
WinAntiVirus Pro 2007
Trojan.Vundo

Loading...