Protect your privacy with new targets for February 2010 (0149.0127-0149.0150)

by Albin on February 10th, 2010 in Definition File Updates.

Newly created families for February (0149.0127-0149.0150)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users.
Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.BadBar
Win32.Adware.BrowserQuest
Win32.Adware.FlyingCall
Win32.Adware.Gameztar
Win32.Adware.iLookup
Win32.Adware.LinkGuide
Win32.Adware.MadFinder
Win32.Adware.Recom
Win32.Adware.Wyyo

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Advo
Win32.Backdoor.BotNet
Win32.Backdoor.Flitor
Win32.Backdoor.Floder
Win32.Backdoor.Fxsvc
Win32.Backdoor.Hostil
Win32.Backdoor.ITBot
Win32.Backdoor.Krafcot
Win32.Backdoor.Mazben
Win32.Backdoor.MonoBot
Win32.Backdoor.Netspy_ii
Win32.Backdoor.Nova
Win32.Backdoor.Papras
Win32.Backdoor.Runagry
Win32.Backdoor.Sqluser
Win32.Backdoor.Tripod
Win32.Backdoor.Zepfod

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   

Win32.Dialer.Anulla
Win32.Dialer.Blois
Win32.Dialer.Celebat
Win32.Dialer.Conok
Win32.Dialer.Payer
Win32.Dialer.Sessa

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.BaoFa
Win32.TrojanDownloader.Chirik
Win32.TrojanDownloader.Dsavn
Win32.TrojanDownloader.JSPegel
Win32.TrojanDownloader.JSTwetti
Win32.TrojanDownloader.JSWinad
Win32.TrojanDownloader.JSZapchast
Win32.TrojanDownloader.Loag
Win32.TrojanDownloader.Mamba
Win32.TrojanDownloader.Refroso
Win32.TrojanDownloader.Saffle
Win32.TrojanDownloader.VBSBikiwi
Win32.TrojanDownloader.VBSIwill
Win32.TrojanDownloader.VBSPhel
Win32.TrojanDownloader.VBSPsyme

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.Flooder.Livebomber
Win32.EmailFlooder.Stealm
Win32.SMSFlooder.Bymbk
Win32.SMSFlooder.Chinas
Win32.SMSFlooder.Mehm
Win32.SMSFlooder.MobKiller
Win32.SMSFlooder.Simple
Win32.SMSFlooder.Star
Win32.SMSFlooder.VB

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.AdvancedDefender
Win32.FraudTool.Antivirus
Win32.FraudTool.AntivirusSoft
Win32.FraudTool.APcDefender
Win32.FraudTool.APcSafe
Win32.FraudTool.APcSecure
Win32.FraudTool.ArmorDefender
Win32.FraudTool.DefendAPc
Win32.FraudTool.GhostAntivirus
Win32.FraudTool.GuardPro
Win32.FraudTool.GuardWWW
Win32.FraudTool.InfoStop
Win32.FraudTool.InSysSecure
Win32.FraudTool.LiveEnterpriseSuite
Win32.FraudTool.MyPcSecure
Win32.FraudTool.PaladinAntivirus
Win32.FraudTool.PCprotectar
Win32.FraudTool.PcSecureNet
Win32.FraudTool.PcsSecure
Win32.FraudTool.Protectdefender
Win32.FraudTool.ProtectSoldier
Win32.FraudTool.RegistryCleanerPro
Win32.FraudTool.SafePcAV
Win32.FraudTool.SafetyKeeper
Win32.FraudTool.SecurePcAV
Win32.FraudTool.SysDefenders
Win32.FraudTool.SysProtector
Win32.FraudTool.TotalPCDefender2010
Win32.FraudTool.WinSecurity360
Win32.FraudTool.XpAntispyware2010
Win32.FraudTool.YourPCProtector

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.BATDelSys
Win32.Trojan.BATKillAV
Win32.Trojan.BATPasser
Win32.Trojan.Bihoh
Win32.Trojan.Clover
Win32.Trojan.CryptoVB
Win32.Trojan.Emis
Win32.Trojan.Fafafa
Win32.Trojan.Fregee
Win32.Trojan.Goriadu
Win32.Trojan.Gudok
Win32.Trojan.Harx
Win32.Trojan.Hydraq
Win32.Trojan.Immumize
Win32.Trojan.Induc
Win32.Trojan.Jeloge
Win32.Trojan.Lac
Win32.Trojan.Mahato
Win32.Trojan.Manpro
Win32.Trojan.MSILAgent
Win32.Trojan.NSISVoter
Win32.Trojan.Obfusim
Win32.Trojan.Opus
Win32.Trojan.Ormimro
Win32.Trojan.Physics
Win32.Trojan.Psyx
Win32.Trojan.Ript
Win32.Trojan.Rozena
Win32.Trojan.Run
Win32.Trojan.Secur
Win32.Trojan.Shuba
Win32.Trojan.Subsearch
Win32.Trojan.Tjp
Win32.Trojan.Upd

TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.BATAgent
Win32.TrojanClicker.Promo
Win32.TrojanClicker.VBSAgent

TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Dambey
Win32.TrojanDDoS.Drefos

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Adeca
Win32.TrojanDropper.Bigmovie
Win32.TrojanDropper.Conser
Win32.TrojanDropper.Drooptroop
Win32.TrojanDropper.Katok
Win32.TrojanDropper.Pendr
Win32.TrojanDropper.QQpluq
Win32.TrojanDropper.Rol
Win32.TrojanDropper.Shiz
Win32.TrojanDropper.Snag
Win32.TrojanDropper.Tab
Win32.TrojanDropper.TDSS
Win32.TrojanDropper.Wansrog
Win32.TrojanDropper.VBSBoom
Win32.TrojanDropper.VBSDrivs
Win32.TrojanDropper.VBSInor
Win32.TrojanDropper.VBSJelpad
Win32.TrojanDropper.VBSSmall
Win32.TrojanDropper.VBSWink   

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Dibik
Win32.TrojanSpy.Hascha
Win32.TrojanSpy.Insain
Win32.TrojanSpy.Kbd
Win32.TrojanSpy.Krap
Win32.TrojanSpy.Mitglieder
Win32.TrojanSpy.Msn-spy
Win32.TrojanSpy.Vbot

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Chifir
Win32.Worm.Mseus
Win32.Worm.Popwin
Win32.Worm.Voterai
Win32.IMWorm.Skipe
Win32.IRCWorm.BATZazz
Win32.IRCWorm.Porn
Win32.Monitor.EasyKeyLogger
Win32.Monitor.WebSiteSpy
Win32.P2PWorm.Butibrot
Win32.P2PWorm.Copybat
Win32.P2PWorm.Fugo
Win32.P2PWorm.Harex
Win32.P2PWorm.Xiv

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Exploit.Agent
Win32.Exploit.MS04-028
Win32.Exploit.MS04-032
Win32.Exploit.MS06-005
Win32.Exploit.MS08-067
Win32.Exploit.MSPPointAgent
Win32.Exploit.MSWordAgent
Win32.Rootkit.Banload
Win32.Rootkit.Spb
Win32.Rootkit.ZAccess
Win32.TrojanIM.Agent
Win32.TrojanIM.AIMJack
Win32.TrojanIM.AIMMorph
Win32.TrojanIM.AIMOber
Win32.TrojanIM.Amath
Win32.TrojanIM.Amer
Win32.TrojanIM.AnalogX
Win32.TrojanIM.Aobos
Win32.TrojanIM.AOLTray
Win32.TrojanIM.Assassin
Win32.TrojanIM.Break
Win32.TrojanIM.Bucop
Win32.TrojanIM.Buddy
Win32.TrojanIM.Casey
Win32.TrojanIM.CD386
Win32.TrojanIM.Chalex
Win32.TrojanIM.Click
Win32.TrojanIM.Connect
Win32.TrojanIM.Count
Win32.TrojanIM.Delf
Win32.TrojanIM.Digga
Win32.TrojanIM.DMbeta
Win32.TrojanIM.Double
Win32.TrojanIM.DreamCatch
Win32.TrojanIM.Epex
Win32.TrojanIM.ExplAOL
Win32.TrojanIM.Explore
Win32.TrojanIM.Greetz
Win32.TrojanIM.Here
Win32.TrojanIM.Hinweis
Win32.TrojanIM.Intet
Win32.TrojanIM.IPThief
Win32.TrojanIM.King
Win32.TrojanIM.Kored
Win32.TrojanIM.Lisa
Win32.TrojanIM.Mayh
Win32.TrojanIM.Meanda
Win32.TrojanIM.Moniter
Win32.TrojanIM.Movie
Win32.TrojanIM.Oscar
Win32.TrojanIM.Outlaw
Win32.TrojanIM.Owner
Win32.TrojanIM.Pamtoon
Win32.TrojanIM.Picture
Win32.TrojanIM.Pisces
Win32.TrojanIM.Plaza
Win32.TrojanIM.Promo
Win32.TrojanIM.Proscrol
Win32.TrojanIM.Puntol
Win32.TrojanIM.Punttek
Win32.TrojanIM.Rainman
Win32.TrojanIM.Rampage
Win32.TrojanIM.RoomBuster
Win32.TrojanIM.Run32
Win32.TrojanIM.Signed
Win32.TrojanIM.Signon
Win32.TrojanIM.Speed
Win32.TrojanIM.Steal
Win32.TrojanIM.Stealth
Win32.TrojanIM.Tony
Win32.TrojanIM.Tookit
Win32.TrojanIM.Toser
Win32.TrojanIM.Waol
Win32.TrojanIM.Weekly
Win32.TrojanIM.Whord
Win32.TrojanIM.Winspy
Win32.TrojanIM.Xinon
Win32.TrojanMailfinder.Agent
Win32.TrojanMailfinder.Massmail
Win32.TrojanProxy.Pramro
Win32.TrojanPWS.Kajdi
Win32.TrojanPWS.Winactivator
Win32.TrojanRansom.Chameleon
Win32.TrojanRansom.Dummy
Win32.TrojanRansom.PinkBlocker
Win32.TrojanRansom.WinBlocker

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now