Protect your privacy with new targets for February 2010

by Andy on March 2nd, 2011 in Definition File Updates.

Newly created families for February 2010

ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.PinSearch
Win32.Adware.PlusTab
Win32.Adware.SimilarWeb

BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.711
Win32.Backdoor.Cvvstealer
Win32.Backdoor.Dusta
Win32.Backdoor.Gippig
Win32.Backdoor.Rosex
Win32.Backdoor.Vortexdoor

DIALERS
Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   

Win32.Dialer.Btv
Win32.Dialer.Capredeam

DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Advancedcleaner
Win32.TrojanDownloader.Icehart
Win32.TrojanDownloader.Knigsfot
Win32.TrojanDownloader.Laconic
Win32.TrojanDownloader.Pebox
Win32.TrojanDownloader.Scriptec
Win32.TrojanDownloader.Swiftcleaner
Win32.TrojanDownloader.Vqod
Win32.TrojanDownloader.Zaccess

FLOODERS
Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.Flooder.Dnf

PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Mailpass
Win32.TrojanPWS.Mlhoter
Win32.TrojanPWS.Rebnip

ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

Win32.FraudTool.AKorea
Win32.FraudTool.AllClean
Win32.FraudTool.AntiPrivacy
Win32.FraudTool.AntiViraAV
Win32.FraudTool.AntivirusNET
Win32.FraudTool.AntivirusSystem2011
Win32.FraudTool.BlueSolution
Win32.FraudTool.Boan24
Win32.FraudTool.Boan365
Win32.FraudTool.CleanSafer
Win32.FraudTool.CleanVaccine
Win32.FraudTool.CZenNetworks
Win32.FraudTool.DataProtect
Win32.FraudTool.DBClean
Win32.FraudTool.DdosClean
Win32.FraudTool.DGNetworks
Win32.FraudTool.DoctorV
Win32.FraudTool.EclipseAntivirus
Win32.FraudTool.EGN
Win32.FraudTool.Eprotect
Win32.FraudTool.FakeAVG
Win32.FraudTool.FileMom
Win32.FraudTool.HardClean
Win32.FraudTool.HDScanAntivirus
Win32.FraudTool.InfoCleaner
Win32.FraudTool.InfoCure
Win32.FraudTool.InternetDefender
Win32.FraudTool.InternetVaccine
Win32.FraudTool.Intmedialab
Win32.FraudTool.JHCompany
Win32.FraudTool.JiniInfo
Win32.FraudTool.LiveBoan
Win32.FraudTool.McAVG
Win32.FraudTool.MegaAntivirus2012
Win32.FraudTool.NeoVaccine
Win32.FraudTool.NKSolution
Win32.FraudTool.PCBoan365
Win32.FraudTool.PCCare
Win32.FraudTool.PcCure
Win32.FraudTool.PCSafeZone
Win32.FraudTool.PCSecurity2011
Win32.FraudTool.PCVaccine
Win32.FraudTool.PlusBoan
Win32.FraudTool.PrivacyHidden
Win32.FraudTool.PrivacyPC
Win32.FraudTool.ProVaccine
Win32.FraudTool.SafeCare
Win32.FraudTool.SafePrivate
Win32.FraudTool.SecurityBoan
Win32.FraudTool.SmartInternetProtection2011
Win32.FraudTool.SpecialGuard
Win32.FraudTool.Speenus
Win32.FraudTool.SpywareProtection
Win32.FraudTool.Storyt
Win32.FraudTool.UtilCube
Win32.FraudTool.VaccineCheck
Win32.FraudTool.VCBoan
Win32.FraudTool.WindowsAntispywareSolution
Win32.FraudTool.WindowsAVSoftware
Win32.FraudTool.WindowsCareTool
Win32.FraudTool.WindowsDisk
Win32.FraudTool.WindowsExpressHelp
Win32.FraudTool.WindowsExpressSettings
Win32.FraudTool.WindowsHealthCenter
Win32.FraudTool.WindowsOptimalSettings
Win32.FraudTool.WindowsOptimalSolution
Win32.FraudTool.WindowsOptimalTool
Win32.FraudTool.WindowsPerformanceManager
Win32.FraudTool.WindowsProblemsProtector
Win32.FraudTool.WindowsProblemsRemover
Win32.FraudTool.WindowsProblemsSolution
Win32.FraudTool.WindowsProcessesOrganizer
Win32.FraudTool.WindowsRiskEliminator
Win32.FraudTool.WindowsSafetyGuarantee
Win32.FraudTool.WindowsScan
Win32.FraudTool.WindowsShieldCenter
Win32.FraudTool.WindowsSoftwareGuard
Win32.FraudTool.WindowsSoftwareProtection
Win32.FraudTool.WindowsTroublesAnalyzer
Win32.FraudTool.WindowsUniversalTool
Win32.FraudTool.WindowsUserSatellite
Win32.FraudTool.WindowsUtilityTool
Win32.FraudTool.WindowsWiseProtection
Win32.FraudTool.ZeroVaccine

TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Beeplus
Win32.Trojan.Diple
Win32.Trojan.Eyestye
Win32.Trojan.Fakedefrag
Win32.Trojan.Faveav
Win32.Trojan.Gazum
Win32.Trojan.Maudi
Win32.Trojan.Menti
Win32.Trojan.Niona
Win32.Trojan.Servstar
Win32.Trojan.Sisn
Win32.Trojan.Webprefix
Win32.Trojan.Xio
Win32.Trojan.Yoddos

TROJAN.CLICKERS
Trojan.Clickers may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Pipigo

TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Ticker

TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.   

Win32.TrojanDropper.Aspxor
Win32.TrojanDropper.Meno
Win32.TrojanDropper.Se
Win32.TrojanDropper.Zdesnado

TROJANNOTIFIERS
Trojan.TrojanNotifiers are trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing the system vulnerability. TrojanNotifiers may thereby compromise system security and user privacy.

Win32.TrojanNotifier.Haxor
Win32.TrojanNotifier.Rip

TROJANPROXIES
Trojan.Proxy's may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Glukelira
Win32.TrojanProxy.Portram
Win32.TrojanProxy.Puma   

TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Mazpayn

WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.IMWorm.Braban
Win32.IMWorm.Ckbface
Win32.IMWorm.Licat
Win32.IMWorm.Qimiral
Win32.IMWorm.Sohanad
Win32.IMWorm.Vb
Win32.Worm.Botkiller
Win32.Worm.Chiwawah
Win32.Worm.Chunga
Win32.Worm.Ckbface
Win32.Worm.Garm
Win32.Worm.Josam
Win32.Worm.Snfer
Win32.Worm.Wbna
Win32.Worm.Yahos
Win32.Worm.Zeroll

MISCELLANEOUS
This grouping contains other programs.

RelevantKnowledge
Win32.PWSTool.PWDump
Win32.Rootkit.Blakken
Win32.Rootkit.Fu
Win32.Rootkit.Goodkit
Win32.Toolbar.GooFullSearch
Win32.Toolbar.Sioril
Win32.TrojanRansom.Cryfile
Win32.TrojanRansom.Holotron
Win64.Trojan.Startpage
Yontoo

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now