Trojan.Spamavicon

Trojan.Spamavicon is a computer Trojan that will connect to a predefined domain to download encrypted information connected to spam emails. The Trojan is made to send unsolicited email messages via the infected computer. It can alter Windows registry to bypass Windows firewall and mass-mail a copy of the corrupt code to target recipients. More

Trojan.Bisrala

Trojan.Bisrala is a computer Trojan that when executed will connect to a remote server to download more threats. This threat also deletes some system files on the infected computer. It will also embed itself to some system files to run the Trojan when Windows starts.

Presence of this threat not only harms critical data but also endangers the privacy of the user. More

Windows XP Restore

Windows XP Restore

Windows XP Restore is a fake program that will pretend as system optimization application in order to deceive computer users. Windows XP Restore virus is distributed by means of Trojans and malicious files uploaded on different servers such as web sites and file-sharing networks. It is also sometime sent through email as an attached file to spam messages. Typically, Windows XP Restore will be installed on computer without the full knowledge of the user. Since it is a deceiving application, so many believe that it is needed to fix any computer-related issues. When loaded on to victims computer, Windows XP Restore will start generating fake diagnostics of the system. It will prompt an advise to fix it by having the paid version of this useless program. More

Windows Vista Restore and Windows 7 Restore

Windows Vista Restore and Windows 7 Restore

Windows Vista Restore or also known as Windows 7 Restore is a potentially unwanted program that will disguise itself as a legitimate program. It may function as an analysis and optimization software that will provide fake information in order to mislead computer users. Windows Vista Restore will aim to make users believe that computer is having problems and promote itself to fix them. Usually, Windows 7 Restore is installed by a Trojan that will infect a computer and issue task bar messages. It will also fabricate system scan results showing problems on hard drives and memory. When executed and attempt to fix the PC, Windows Vista Restore will be downloaded from a remote web site and automatically install on victims computer without a consent. More

XP Security 2012

XP Security 2012

XP Security 2012 is a rogue program that extends its infection to as many users with the support of fake security web sites. Spreading with the help of Trojan, it targets people who are browsing the Internet more often. It enters the computer in an unusual way and instantly loads a copy of XP Security 2012 without permission. XP Security 2012 installation will begin as soon as all files are complete inside the system. With its rootkit techniques, it able to hide a presence from legitimate security software. Once inside the system, this malicious antivirus modifies system settings and begins to add values on the registry. The same counterfeit AV will engage browser hijacking to redirect search result link to predefined web sites that hosts other threats. More

XP Antispyware 2012

XP Antispyware 2012

XP Antispyware 2012 or also known as  XP Anti-Spyware 2012 virus is a randomly installed fake anti-virus program.This program will usually introduce as message from the current web page and when executed will provide a fake online virus scan that may result to acquisition of this unwanted application. The messages will be displayed as: More

XP Home Security 2012

XP Home Security 2012

XP Home Security 2012 is a program that will display exaggerated warning messages once installed on the computer. XP Home Security 2012 is a virus that belongs to a large family of rogue program that uses the Internet to spread them. Taking advantage of victim’s weakness in identifying real security issues, it will fabricate virus scan results to force users into acquiring the paid version of the program. While XP Home Security 2012 is still present on the computer, a continuous pop-up of false warning can be observed. Stopping these annoyances does not necessary mean that a full version of XP Home Security 2012 is needed. In fact, it is the sole application that must be eliminated. More

XP Total Security 2012

XP Total Security 2012

XP Total Security 2012 is a misleading application that belongs to a large rogue software family. XP Total Security 2012 is interpreted as a program that will attempt to steal money from computer users once it penetrates the system. It usually ends the scenario by asking the credit card information of the victim or forcing them pay for the registered version of the program in order to remove identified threats. Typically, fake anti-virus software like XP Total Security 2012 will constantly display fake warning messages and execute a virus scan once Windows starts. On this sequence, a recommendation to obtain the paid version is constantly displayed. Authors of the rogue program will actively push its product by all means. More

XP Anti-Virus 2012

XP Anti-Virus 2012

XP Antivirus 2012 is definitely bogus security software that force its way inside target computer in the same manner as Trojans, viruses and worms. Once inside, XP Antivirus 2012 virus will take full jurisdiction and manages to direct operation in general. Usually, fake security application gets loaded onto system in a cheating form of Windows update, multimedia decoder, Adobe Flash update or any similar illusory course of action. Deceived computer users may actually download and install XP Antivirus 2012 in the background while setting-up legitimate software. More

XP Internet Security 2012

XP Internet Security 2012

XP Internet Security 2012 is a potentially unwanted program or also known as rogue. Being on the lists of rogue applications is not enough to warn users of its dangers when executed. XP Internet Security 2012 will be dropped on computers by its partner Trojan that uses a rootkit technique to be able to hide its presence from anti-virus program. When inside the computer, it will make necessary changes in favor of XP Internet Security 2012′s illegal operation inside the compromised computer. Its first target was to modify the registry so that it will be included in the start-up process of Windows. More