Protect your privacy with new targets for March 2010 (0149.0151-0149.0173)

by Albin on March 12th, 2010 in Definition File Updates.

Newly created families for March (0149.0151-0149.0173)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.Accoona
Win32.Adware.Adsina
Win32.Adware.Adsrve
Win32.Adware.Advancedsearchbar
Win32.Adware.Browvil
Win32.Adware.CashSpace
Win32.Adware.ComedyPlanet
Win32.Adware.Connector
Win32.Adware.DropWare
Win32.Adware.Excite
Win32.Adware.Favev
Win32.Adware.Gibmed
Win32.Adware.Girs
Win32.Adware.Gonaser
Win32.Adware.Guanggao
Win32.Adware.Havedo
Win32.Adware.Hmt
Win32.Adware.Infun
Win32.Adware.MegaKiss
Win32.Adware.Netrover
Win32.Adware.Ramdud
Win32.Adware.RekloPay
Win32.Adware.RiverAd
Win32.Adware.RON
Win32.Adware.ScreenSaver
Win32.Adware.SearchPage
Win32.Adware.Simbar
Win32.Adware.Spam
Win32.Adware.SurfSide
Win32.Adware.ThemeAdp
Win32.Adware.Timesinc
Win32.Adware.Yokbar

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Almetyevsk
Win32.Backdoor.Dgrat
Win32.Backdoor.Digispy
Win32.Backdoor.Digitalhand
Win32.Backdoor.DogroBot
Win32.Backdoor.Dragodor
Win32.Backdoor.Genocide
Win32.Backdoor.Gimbot
Win32.Backdoor.Glowint
Win32.Backdoor.Gnotify
Win32.Backdoor.Googbot
Win32.Backdoor.GtBot
Win32.Backdoor.Ilinag
Win32.Backdoor.Kosmo
Win32.Backdoor.Kverzdoor
Win32.Backdoor.Leeter
Win32.Backdoor.Lohocla
Win32.Backdoor.Midrug
Win32.Backdoor.Nsskill
Win32.Backdoor.Paravoz
Win32.Backdoor.Runar
Win32.Backdoor.Sjak
Win32.Backdoor.Soul
Win32.Backdoor.Telserver
Win32.Backdoor.Upload
Win32.Backdoor.Vport
Win32.Backdoor.Worldofshock
Win32.Backdoor.Zosu
Win32.Backdoor.Zuza

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   

Win32.Dialer.Archi
Win32.Dialer.Connetti
Win32.Dialer.Creazione
Win32.Dialer.Dialerco
Win32.Dialer.Freload
Win32.Dialer.Inteli
Win32.Dialer.Libero
Win32.Dialer.Master69
Win32.Dialer.Moromi
Win32.Dialer.Pormd
Win32.Dialer.Porx
Win32.Dialer.Turbodialer
Win32.Dialer.Xnet
Win32.Dialer.Ylove

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Calipr
Win32.TrojanDownloader.Ezadd
Win32.TrojanDownloader.Hover2
Win32.TrojanDownloader.Kaiserdown
Win32.TrojanDownloader.Liwak
Win32.TrojanDownloader.Maygli
Win32.TrojanDownloader.Oxes
Win32.TrojanDownloader.Roucdera
Win32.TrojanDownloader.Sharbi

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.EmailFlooder.Jcemail
Win32.Flooder.Bing
Win32.Flooder.Chatflood
Win32.Flooder.Denyo
Win32.Flooder.IMadering
Win32.Flooder.Shockwave
Win32.Flooder.Vknkte
Win32.IMFlooder.Killbig

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.IP-Guard
Win32.Monitor.KeyPressHooker
Win32.Monitor.NetMon
Win32.Monitor.ProcessLogger
Win32.Monitor.SysKL

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Alexander
Win32.TrojanPWS.Borger
Win32.TrojanPWS.Caldut
Win32.TrojanPWS.Eruwbi
Win32.TrojanPWS.Fakeegold
Win32.TrojanPWS.Frethoq
Win32.TrojanPWS.Intpack
Win32.TrojanPWS.Jolly
Win32.TrojanPWS.Pet
Win32.TrojanPWS.Unprofiler
Win32.TrojanPWS.Upder

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.BachKhoa
Win32.FraudTool.ComDoUmi
Win32.FraudTool.DesktopSecurity2010
Win32.FraudTool.DoubleVaccine
Win32.FraudTool.DrGuard
Win32.FraudTool.FastAntiSpyware
Win32.FraudTool.InfoArmor
Win32.FraudTool.IPArmor
Win32.FraudTool.MaCatte
Win32.FraudTool.MyComGuard
Win32.FraudTool.MyPCGuard
Win32.FraudTool.MySecurityWall
Win32.FraudTool.PCDefender
Win32.FraudTool.SecurityEssentials2010
Win32.FraudTool.SmartSecurity
Win32.FraudTool.SpyDefender
Win32.FraudTool.Stiratel
Win32.FraudTool.TotalCleaner
Win32.FraudTool.VirusProtector

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Arugizer
Win32.Trojan.Asniff
Win32.Trojan.Byekis
Win32.Trojan.Ddox
Win32.Trojan.DelRegKeys
Win32.Trojan.Explorm
Win32.Trojan.Fides
Win32.Trojan.Gluk
Win32.Trojan.Grom
Win32.Trojan.Infos
Win32.Trojan.Istall
Win32.Trojan.Manas
Win32.Trojan.Mbiz
Win32.Trojan.Muma
Win32.Trojan.Naiput
Win32.Trojan.Olamer
Win32.Trojan.Ovuhamp
Win32.Trojan.Pero
Win32.Trojan.Phiser
Win32.Trojan.Phisher
Win32.Trojan.Pres
Win32.Trojan.Ranna
Win32.Trojan.Riner
Win32.Trojan.Sobetr
Win32.Trojan.Sovest
Win32.Trojan.Spaceeater
Win32.Trojan.Steriod
Win32.Trojan.Subnix
Win32.Trojan.Toras
Win32.Trojan.Tscash
Win32.Trojan.Xoror
Win32.Trojan.Y7d0
Win32.TrojanIM.AIMLog
Win32.TrojanIM.Ikmet
Win32.TrojanIM.Koko
Win32.TrojanIM.Polan
Win32.TrojanIM.Sysmon

TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Autoup
Win32.TrojanClicker.Traux
Win32.TrojanClicker.XClick

TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Wedos

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.   

Win32.TrojanDropper.Bototer
Win32.TrojanDropper.Drodih
Win32.TrojanDropper.Emiswod
Win32.TrojanDropper.Invisjoiner
Win32.TrojanDropper.Multispy
Win32.TrojanDropper.Netgot
Win32.TrojanDropper.Peerad
Win32.TrojanDropper.Plot
Win32.TrojanDropper.Pornodrom
Win32.TrojanDropper.Probn
Win32.TrojanDropper.Residends
Win32.TrojanDropper.Rjoin
Win32.TrojanDropper.Tofsee
Win32.TrojanDropper.Welder

TROJANNOTIFIERS

Trojan.TrojanNotifiers are trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing the system vulnerability. TrojanNotifiers may thereby compromise system security and user privacy.

Win32.TrojanNotifier.Ees
Win32.TrojanNotifier.Yanot

TROJANPROXY'S


Trojan.Proxy's may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Mediana
Win32.TrojanProxy.Tiny

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Bankobao
Win32.TrojanSpy.Bansock
Win32.TrojanSpy.Baraklo
Win32.TrojanSpy.Batton
Win32.TrojanSpy.Brazban
Win32.TrojanSpy.Cam2Ftp
Win32.TrojanSpy.Carry
Win32.TrojanSpy.Egoldan
Win32.TrojanSpy.Entry
Win32.TrojanSpy.Fibbit
Win32.TrojanSpy.Godzilla
Win32.TrojanSpy.Hsow
Win32.TrojanSpy.Ldpinch
Win32.TrojanSpy.Loxxee
Win32.TrojanSpy.Melyc
Win32.TrojanSpy.Mircspy
Win32.TrojanSpy.Mispy
Win32.TrojanSpy.Multithief
Win32.TrojanSpy.Nubiz
Win32.TrojanSpy.Osa
Win32.TrojanSpy.Qpolos
Win32.TrojanSpy.Rassol
Win32.TrojanSpy.Sabood
Win32.TrojanSpy.SpyEyes
Win32.TrojanSpy.Starlogger
Win32.TrojanSpy.Vagon
Win32.TrojanSpy.Vkont
Win32.TrojanSpy.Wemon
Win32.TrojanSpy.Zcbhiv

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user.
However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.IMWorm.Bropia
Win32.IMWorm.Kelvir
Win32.IMWorm.Lamar
Win32.IMWorm.Lolbot
Win32.IMWorm.Psyke
Win32.IMWorm.Sramota
Win32.IRCWorm.Alcaul
Win32.IRCWorm.Gift
Win32.IRCWorm.Kilt
Win32.P2PWorm.Gamer
Win32.P2PWorm.Gamlet
Win32.P2PWorm.Shypan
Win32.Worm.CaimBot
Win32.Worm.Chiviper
Win32.Worm.Gultung
Win32.Worm.Gurong
Win32.Worm.Loader
Win32.Worm.Lover
Win32.Worm.Messenger
Win32.Worm.Misue
Win32.Worm.Naverno
Win32.Worm.Poza
Win32.Worm.Semail
Win32.Worm.Zorin

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Hoax.Burner
Win32.Hoax.DisableInput
Win32.Hoax.GSMcrack
Win32.Hoax.Neospace
Win32.Hoax.Rolcardgen
Win32.Rootkit.AntiAV
Win32.Rootkit.Cetorp
Win32.Rootkit.Demoghost
Win32.Rootkit.Fakeip
Win32.Rootkit.Fdog
Win32.Rootkit.KilLAV
Win32.Rootkit.Radu
Win32.Rootkit.Thost
Win32.Rootkit.Uca
Win32.Rootkit.Xanfpezes
Win32.Spoofer.GG
Win32.Spoofer.Joel
Win32.Spoofer.Suf
Win32.Toolbar.SecToolbar
Win32.TrojanMailfinder.Magplayer
Win32.TrojanRansom.Cdrew
Win32.TrojanRansom.DigiPog
Win32.TrojanRansom.DigPog
Win32.TrojanRansom.FraudBlocker
Win32.TrojanRansom.FullScreen
Win32.TrojanRansom.mayArchive

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now