Protect your privacy with new targets for September 2008 (0111.0000-0121.0000)
Newly created families for September (0111.0000-0121.0000)
ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Adware.Getup
Adware.Jumpgate
Adware.Kitsune
Adware.Mycashbag
Adware.NetNucleus
Adware.Relevant
Adware.SearchIt
Adware.SmartBrowser
Adware.TickerBar
BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.Arash
Win32.Backdoor.Arin
Win32.Backdoor.Dreamy
Win32.Backdoor.Frauder
Win32.Backdoor.Hijack
Win32.Backdoor.Joleee
Win32.Backdoor.Knockit
Win32.Backdoor.Krass
Win32.Backdoor.Lordly
Win32.Backdoor.Mailbot
Win32.Backdoor.Multicom
Win32.Backdoor.NewRest
Win32.Backdoor.Orkus
Win32.Backdoor.Qmop
Win32.Backdoor.Schimit
Win32.Backdoor.Shelldon
Win32.Backdoor.Shodabot
Win32.Backdoor.Spybot
Win32.Backdoor.Stridor
Win32.Backdoor.UltimateDefender
DIALERS
Dialers are programs that utilize a computer's modem to make calls or access services. Users may want to remove dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.
Win32.Dialer.BaseActivities
Win32.Dialer.Xdial
DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDowloader.Stration
Win32.TrojanDownloader.Braviax
Win32.TrojanDownloader.Calac
Win32.TrojanDownloader.CodecPack
Win32.TrojanDownloader.Donn
Win32.TrojanDownloader.FakeAlert
Win32.TrojanDownloader.FlyCodec
Win32.TrojanDownloader.Gaso
Win32.TrojanDownloader.HotTV
Win32.TrojanDownloader.IMLoader
Win32.TrojanDownloader.JIYE
Win32.TrojanDownloader.JKFQ
Win32.TrojanDownloader.JKJE
Win32.TrojanDownloader.JKJY
Win32.TrojanDownloader.JKKR
Win32.TrojanDownloader.JKLF
Win32.TrojanDownloader.JKNX
Win32.TrojanDownloader.Kobcka
Win32.TrojanDownloader.Nonaco
Win32.TrojanDownloader.NSIS.Agent
Win32.TrojanDownloader.SteamAcco
Win32.TrojanDownloader.Swf
Win32.TrojanDownloader.ZombGet
FLOODERS
Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.
Win32.Flooder.Krate
Win32.Flooder.Vertas
MONITORS
Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.
Win32.Monitor.AdvancedSpy
Win32.Monitor.CyberSpy
Win32.Monitor.KeyLoggerLite
Win32.Monitor.KGBSpy
PASSWORD STEALERS
Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.Trojan-PWS.Firefox
Win32.TrojanPWS.ICQ
Win32.Trojan-PWS.IMMultiPass
Win32.Trojan-PWS.Multi
Win32.Trojan-PWS.Odedem
Win32.TrojanPWS.Rumrux
ROUGE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
AdvancedPrivacyGuard
AdvancedPrivacySuite
AdwareDeluxe
AntispywareProXP
Antivir64
Antivirus 2008 XP
AntivirusDoc
AntivirusSecurity
Cleaner2009
HotKeysHook
InternetAntivirus
MaxAntiSpy
MicroAntivirus2009
MSAntivirus
PC Protection Center 2008
PcCleanPro
PowerAntivirus
RegistryDoc
RegistryDoctor
SecurityScanner2008
SmartAntivirus2009
SpyDevastator
SpywarePreventer
SpywareScanner2008
Takedawnload
TotalSecure2009
WinProtector
XLG Security Center
XPertAntivirus
XP-Guard
XPProtector2009
TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.AIVN
Win32.Trojan.AJJX
Win32.Trojan.Asixmare
Win32.Trojan.Blakhal
Win32.Trojan.Boaxxe
Win32.Trojan.Boot
Win32.Trojan.BootKiller
Win32.Trojan.Brof
Win32.Trojan.Crackpai
Win32.Trojan.DelSelf
Win32.Trojan.Emo
Win32.Trojan.Exterminator
Win32.Trojan.Feutel
Win32.Trojan.FlyStudio
Win32.Trojan.Fraudpack
Win32.Trojan.Fukea
Win32.Trojan.Gernid
Win32.Trojan.HackAV
Win32.Trojan.Helodor
Win32.Trojan.Jakuz
Win32.Trojan.Kilva
Win32.Trojan.Lebag
Win32.Trojan.Metajuan
Win32.Trojan.Mirabuh
Win32.Trojan.Nate
Win32.Trojan.Nethell
Win32.Trojan.Opnis
Win32.Trojan.Pacex
Win32.Trojan.Pitink
Win32.Trojan.Pozad
Win32.Trojan.RegistryDisabler
Win32.Trojan.Renpwl
Win32.Trojan.Riler
Win32.Trojan.Rincux
Win32.Trojan.Roodro
Win32.Trojan.Shipli
Win32.Trojan.Shua
Win32.Trojan.Skintrim
Win32.Trojan.Startup.NameShifter
Win32.Trojan.StopMeIfYouCan
Win32.Trojan.Sysctc
Win32.Trojan.Tibia
Win32.Trojan.Uzilich
Win32.Trojan.Virtl
Win32.Trojan.Worldonline
Win32.Trojan.Zalup
TROJANDDoS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Quickflood
TROJAN.CLICKERS
Trojan.Clicker's may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.
Win32.TrojanClicker.Flyst
Win32.TrojanClicker.Xone
TROJAN.DROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders.
Win32.Trojan-Dropper.Binder
Win32.Trojan-Dropper.Cutwail
Win32.Trojan-Dropper.Dorn
Win32.Trojan-Dropper.Instaler
Win32.Trojan-Dropper.IRC
Win32.Trojan-Dropper.KillAV
Win32.Trojan-Dropper.Kobcka
Win32.Trojan-Dropper.MemoryInjector
Win32.Trojan-Dropper.Muldrop
Win32.Trojan-Dropper.Neblso
Win32.Trojan-Dropper.NSIS
Win32.Trojan-Dropper.SFX
Win32.Trojan-Dropper.Tiny
TROJAN.PROXIES
Trojan.Proxies may open up the infected machine to be used as a proxy server.
Win32.TrojanProxy.MailX
Win32.TrojanProxy.Osewlone
TROJAN.SPIES
Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.
Win32.TrojanSpy.Ayolog
Win32.TrojanSpy.BewLoader
Win32.TrojanSpy.Spenir
Win32.TrojanSpy.SpyAnyTime
Win32.TrojanSpy.Zeus
WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.Worm.Dropper
Win32.Worm.FakeMessenger
Win32.Worm.FreeBSD.Block
Win32.Worm.FreeBSD.Scalper
Win32.Worm.Gadja
Win32.Worm.Gael
Win32.Worm.IMess
Win32.Worm.Mariofev
Win32.Worm.Muha
Win32.Worm.Nomlur
Win32.Worm.OSX.Inqtana
Win32.Worm.Rapid
Win32.Worm.Rovud
Win32.Worm.Sheng
Win32.Worm.Wass
Win32.Worm.YahLover
MISCELLANEOUS MALWARE
This grouping contains other programs with malicious intentions.
Win32.FakeAlert.PCHealthCenter
Win32.FakeAlert.Wimad
Win32.Hoax.GoldFake
Win32.IRCWorm.Small
Win32.Rootkit.Ressdt
Win32.TrojanRansom.BHO