ADWARE |
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance. |
Adware.DealHelper |
Adware.DealHelper is a potentially unwanted program that displays advertisements and may send information about the user back to its server. |
Adware.DirectWeb |
Adware.DirectWeb is a potentially unwanted program that displays advertisements and may send information about the user back to its server. Adware.DirectWeb is of Korean origin. |
ADWARE |
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance. |
Adware.DealHelper |
Adware.DealHelper is a potentially unwanted program that displays advertisements and may send information about the user back to its server. |
Adware.DirectWeb |
Adware.DirectWeb is a potentially unwanted program that displays advertisements and may send information about the user back to its server. Adware.DirectWeb is of Korean origin. |
Adware.Emuleside |
Adware.Emuleside is a potentially unwanted program that displays advertisements and may send information about the user back to its server. Adware.Emuleside is of Korean origin. |
Adware.TheSpaceZone |
Adware.TheSpaceZone is a potentially unwanted program that displays advertisements and may send information about the user back to its server. |
Adware.Tradfic |
Adware.Tradfic is a potentially unwanted program that displays advertisements and may send information about the user back to its server. |
Adware.VirtualNetwork |
Adware.VirtualNetwork is a potentially unwanted program that displays advertisements and may send information about the user back to its server. |
Toolbar.Anqurio |
Toolbar.Anqurio is a search toolbar which is missing both Privacy Policy and EULA prior to installation. The toolbar is also installed on all user accounts and provides an unfunctional uninstaller. |
BACKDOORS |
Win32.Backdoor.Altice |
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim’s machine. |
Win32.Backdoor.Chfiji |
Win32.Backdoor.DM |
Win32.Backdoor.DMX |
Win32.Backdoor.DnsDoor |
Win32.Backdoor.Dominador |
Win32.Backdoor.Dopedoor |
Win32.Backdoor.DP |
Win32.Backdoor.DTR |
Win32.Backdoor.Ducktoy |
Win32.Backdoor.Duddie |
Win32.Backdoor.Dzyckz |
Win32.Backdoor.Easyserv |
Win32.Backdoor.Eclipse |
Win32.Backdoor.EEYE |
Win32.Backdoor.Elfrit |
Win32.Backdoor.Enculator |
Win32.Backdoor.Eret |
Win32.Backdoor.Executor |
Win32.Backdoor.ExploitDoor |
Win32.Backdoor.Exploiter |
Win32.Backdoor.Express |
Win32.Backdoor.Fakemanga |
Win32.Backdoor.FallingDoor |
Win32.Backdoor.Farfli |
Win32.Backdoor.Fatcon |
Win32.Backdoor.Fatroj |
Win32.Backdoor.FC |
Win32.Backdoor.Feap |
Win32.Backdoor.Fof |
Win32.Backdoor.Fonly |
Win32.Backdoor.ForcedEntry |
Win32.Backdoor.Fore |
Win32.Backdoor.FoxEyes |
Win32.Backdoor.FraggleLite |
Win32.Backdoor.FraggleRock |
Win32.Backdoor.Freak |
Win32.Backdoor.Freddy |
Win32.Backdoor.Freegate |
Win32.Backdoor.Frenzy |
Win32.Backdoor.Froobot |
Win32.Backdoor.FTP.Digund |
Win32.Backdoor.Fulamer |
Win32.Backdoor.FunFactory |
Win32.Backdoor.fyeo |
Win32.Backdoor.GateHell |
Win32.Backdoor.Gayol |
Win32.Backdoor.GDoor |
Win32.Backdoor.Getpass |
Win32.Backdoor.GF |
Win32.Backdoor.GGDoor |
Win32.Backdoor.Ghost |
Win32.Backdoor.GhostVoice |
Win32.Backdoor.GirlBoy |
Win32.Backdoor.Goh |
Win32.Backdoor.Grobodor |
Win32.Backdoor.Gspot |
Win32.Backdoor.GWGirl |
Win32.Backdoor.Hackboy |
Win32.Backdoor.Hackdoor |
Win32.Backdoor.HackerHeaven |
Win32.Backdoor.HacPing |
Win32.Backdoor.Hanuman |
Win32.Backdoor.HatFiend |
Win32.Backdoor.Havoc |
Win32.Backdoor.Hellza |
Win32.Backdoor.Hoaveldoor |
Win32.Backdoor.Hoavelu |
Win32.Backdoor.Hoaxer |
Win32.Backdoor.Hobbit |
Win32.Backdoor.HoneyPot |
Win32.Backdoor.HostControl |
Win32.Backdoor.Huigezi |
Win32.Backdoor.Hurmandor |
Win32.Backdoor.HVL-rat |
Win32.Backdoor.HydroLeak |
Win32.Backdoor.Iblisdoor |
Win32.Backdoor.IcmpCmd |
Win32.Backdoor.Iddono |
Win32.Backdoor.Iemm |
Win32.Backdoor.Ierk |
Win32.Backdoor.InCommand |
Win32.Backdoor.Indexer |
Win32.Backdoor.InetSpy |
Win32.Backdoor.Infexor |
Win32.Backdoor.Infinaeon |
Win32.Backdoor.Inkill |
Win32.Backdoor.Invisdoor |
Win32.Backdoor.Irtih |
Win32.Backdoor.Jes |
Win32.Backdoor.Jinmoze |
Win32.Backdoor.Kaos |
Win32.Backdoor.KeyStart |
Win32.Backdoor.Kidterror |
Win32.Backdoor.Killdientes |
Win32.Backdoor.Kilo |
Win32.Backdoor.Kingos |
Win32.Backdoor.Kokodoor |
Win32.Backdoor.Konik |
Win32.Backdoor.Koretek |
Win32.Backdoor.Kraimer |
Win32.Backdoor.Kryptonic |
Win32.Backdoor.Kwak |
Win32.Backdoor.KWM |
Win32.Backdoor.Kyrdor |
Win32.Backdoor.Lastdoor |
Win32.Backdoor.LazyAdmin |
Win32.Backdoor.LeGuardien |
Win32.Backdoor.Leniv |
Win32.Backdoor.Lesbot |
Win32.Backdoor.Levelone |
Win32.Backdoor.Likun |
Win32.Backdoor.Liondoor |
Win32.Backdoor.Lmir |
Win32.Backdoor.Lybdoor |
Win32.Backdoor.Maniador |
Win32.Backdoor.Manipulator |
Win32.Backdoor.Mantice |
Win32.Backdoor.Mapsy |
Win32.Backdoor.Mard |
Win32.Backdoor.Massaker |
Win32.Backdoor.MasterParadise |
Win32.Backdoor.Matrix |
Win32.Backdoor.Mayhdoor |
Win32.Backdoor.Messah |
Win32.Backdoor.Messo |
Win32.Backdoor.Metal |
Win32.Backdoor.Mhtserv |
Win32.Backdoor.MicroSpy |
Win32.Backdoor.Mierun |
Win32.Backdoor.Millenium |
Win32.Backdoor.Minigift |
Win32.Backdoor.Miniglitch |
Win32.Backdoor.MiniKeyLog |
Win32.Backdoor.Minilash |
Win32.Backdoor.mmcs |
Win32.Backdoor.Mneah |
Win32.Backdoor.Monator |
Win32.Backdoor.MSBot |
Win32.Backdoor.Nabshell |
Win32.Backdoor.Napalm |
Win32.Backdoor.NBSpy |
Win32.Backdoor.NeoArk |
Win32.Backdoor.NetAdmin |
Win32.Backdoor.NetAdvance |
Win32.Backdoor.NetBoy |
Win32.Backdoor.NetBull |
Win32.Backdoor.NetControl |
Win32.Backdoor.Netdex |
Win32.Backdoor.NetDown |
Win32.Backdoor.NetHack |
Win32.Backdoor.NetKat32 |
Win32.Backdoor.Netministartor |
Win32.Backdoor.Netpocalipse |
Win32.Backdoor.NetRunner |
Win32.Backdoor.NetShadow |
Win32.Backdoor.Netso |
Win32.Backdoor.Neworld |
Win32.Backdoor.Nirvana |
Win32.Backdoor.Noknok |
Win32.Backdoor.NoNeed |
Win32.Backdoor.Noxcape |
Win32.Backdoor.NTHack |
Win32.Backdoor.Olive |
Win32.Backdoor.Onever |
Win32.Backdoor.Opwin |
Win32.Backdoor.Osirdoor |
Win32.Backdoor.Oxon |
Win32.Backdoor.PcControl |
Win32.Backdoor.PCInvader |
Win32.Backdoor.Peanut |
Win32.Backdoor.Peeper |
Win32.Backdoor.Peers |
Win32.Backdoor.Pointex |
Win32.Backdoor.Polodor |
Win32.Backdoor.PolterGeist |
Win32.Backdoor.PPdoor |
Win32.Backdoor.Prayer |
Win32.Backdoor.Precursor |
Win32.Backdoor.Prexot |
Win32.Backdoor.Priority |
Win32.Backdoor.Probot |
Win32.Backdoor.Progenic |
Win32.Backdoor.Pulpit |
Win32.Backdoor.QICQSearch |
Win32.Backdoor.Qwin |
Win32.Backdoor.R3C |
Win32.Backdoor.Raid |
Win32.Backdoor.RATCracker |
Win32.Backdoor.Rathead |
Win32.Backdoor.RATPack |
Win32.Backdoor.SevenSphere |
Win32.Backdoor.Shador |
WIn32.Backdoor.Shang |
Win32.Backdoor.SilentSpy |
Win32.Backdoor.Skun |
Win32.Backdoor.Snape |
Win32.Backdoor.SQLConnect |
Win32.Backdoor.Taladrator |
Win32.Backdoor.TheThing |
Win32.Backdoor.UpRootKit |
Win32.Backdoor.VBot |
Win32.Backdoor.Webex |
DOWNLOADERS |
Win32.TrojanDownloader.Acset |
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent. |
Win32.TrojanDownloader.Crypter |
Win32.TrojanDownloader.Loan |
Win32.TrojanDownloader.Pacer |
Win32.TrojanDownloader.Slime |
Win32.TrojanDownloader.Spig |
FLOODERS |
Win32.Flooder.Agent |
Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive. This is similar to a DDoS attack, where a massive amount of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse. |
Win32.Flooder.Fludp |
Win32.Flooder.Fofeet |
Win32.Flooder.Hmast |
Win32.Flooder.Ipt |
Win32.Flooder.Killzone |
Win32.Flooder.Live |
Win32.Flooder.MadMessenger |
MONITORS |
Win32.Monitor.007SpySoft |
Monitors are surveillance tools that, for example, monitor a user’s keystrokes, and therefore may compromise a user’s privacy if used in a malicious manner. |
Win32.Monitor.ActivityKeyLogger |
Win32.Monitor.Chpie |
Win32.Monitor.Dafunk |
Win32.Monitor.ImSurfSent |
Win32.Monitor.MGS |
Win32.Monitor.MsnMon |
Win32.Monitor.PersonalInspector |
Win32.Monitor.RealSpy |
Win32.Monitor.RevKeyLogger |
Win32.Monitor.SpectorPro |
Win32.Monitor.StealthKeylogger |
Win32.Monitor.X1Spy |
NUKERS |
Win32.Nuker.7thSphere |
Nukers are used to harm other computers over the Internet, making them crash or reboot. |
Win32.Nuker.Aic |
Win32.Nuker.NTKiller |
Win32.Nuker.Nukem |
Win32.Nuker.WNuke32 |
PASSWORD STEALERS |
Win32.Trojan-PSW.AlLight |
Password stealers can steal user passwords on an infected system, compromising system security and user privacy. |
Win32.Trojan-PSW.Widget |
Win32.TrojanPWS.Abot |
Win32.TrojanPWS.AccountHunter |
Win32.TrojanPWS.AIMJaker |
Win32.TrojanPWS.AimTroj |
Win32.TrojanPWS.Ajan |
Win32.TrojanPWS.Algus |
Win32.TrojanPWS.Antigen |
Win32.TrojanPWS.Atrojan |
Win32.TrojanPWS.Barok |
Win32.TrojanPWS.Barrio |
Win32.TrojanPWS.Billy |
Win32.TrojanPWS.Blaver |
Win32.TrojanPWS.BStroj |
Win32.Trojan-PWS.DnsTroj |
Win32.Trojan-PWS.Dob |
Win32.Trojan-PWS.DoichBunk |
Win32.Trojan-PWS.EBTReporter |
Win32.Trojan-PWS.Executant |
Win32.Trojan-PWS.F17 |
Win32.Trojan-PWS.Fantast |
Win32.Trojan-PWS.Fente |
Win32.Trojan-PWS.FIU |
Win32.Trojan-PWS.Flystudio |
Win32.Trojan-PWS.Gadu |
Win32.Trojan-PWS.Gametea |
Win32.Trojan-PWS.Gamey |
Win32.Trojan-PWS.Ghostar |
Win32.Trojan-PWS.GinaPass |
Win32.Trojan-PWS.GOPtrojan |
Win32.Trojan-PWS.Hacksoft |
Win32.Trojan-PWS.Hearty |
Win32.Trojan-PWS.Horse |
Win32.Trojan-PWS.ICQ2k |
Win32.Trojan-PWS.INet20 |
Win32.Trojan-PWS.Inverse |
Win32.Trojan-PWS.Jiang |
Win32.Trojan-PWS.Johan |
Win32.Trojan-PWS.Justas |
Win32.Trojan-PWS.Kesk |
Win32.Trojan-PWS.KeyStealer |
Win32.Trojan-PWS.LamerLite |
Win32.Trojan-PWS.Lamot |
Win32.Trojan-PWS.Lizgo |
Win32.Trojan-PWS.Mirpn |
Win32.Trojan-PWS.MMmtask |
Win32.Trojan-PWS.Najort |
Win32.Trojan-PWS.Naughter |
Win32.Trojan-PWS.Needinfo |
Win32.Trojan-PWS.Neman |
Win32.Trojan-PWS.Neol |
Win32.Trojan-PWS.Note |
Win32.Trojan-PWS.Organer |
Win32.Trojan-PWS.Overtron |
Win32.Trojan-PWS.Pec |
Win32.Trojan-PWS.PM |
Win32.Trojan-PWS.PMAIL |
Win32.Trojan-PWS.PMT |
Win32.Trojan-PWS.Pwkiller |
Win32.Trojan-PWS.PVStealth |
Win32.Trojan-PWS.Stealth |
Win32.Trojan-PWS.Sysrater |
Win32.Trojan-PWS.Sysrer |
Win32.Trojan-PWS.Tanspy |
Win32.Trojan-PWS.Tapiras |
Win32.Trojan-PWS.Telsender |
Win32.Trojan-PWS.Teman |
Win32.Trojan-PWS.TestSpy |
Win32.Trojan-PWS.THG |
Win32.Trojan-PWS.Thief |
Win32.Trojan-PWS.Tiant |
Win32.Trojan-PWS.Timsy |
Win32.Trojan-PWS.T-Online |
Win32.Trojan-PWS.Traceboy |
Win32.Trojan-PWS.Trah |
Win32.Trojan-PWS.Unite |
Win32.Trojan-PWS.Watcher |
Win32.Trojan-PWS.Weird |
Win32.Trojan-PWS.Vingrad |
Win32.Trojan-PWS.Wintcp |
Win32.Trojan-PWS.Wortron |
Win32.Trojan-PWS.Vovan |
Win32.Trojan-PWS.Xilon |
Win32.Trojan-PWS.XPassLogger |
Win32.Trojan-PWS.Yahoo.Awjer |
Win32.Trojan-PWS.Yahoo.Nagil |
Win32.Trojan-PWS.Yahoo.YPager |
Win32.Trojan-PWS.YahooPass |
Win32.Trojan-PWS.Zimenok |
Win32.Trojan-PWS.Zombie |
Win32.Trojan-PWS-Pasorot |
ROGUE ANTI-SPYWARE APPLICATIONS |
AdvancedXPDefender |
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats. |
AdvancedXPFixer |
CrisystecSentry |
Defenza |
EliteProtector |
KvmSecure |
MalwarePatrolPro |
MasterAntiVirus |
MySpyProtector |
No Adware |
PCHealthPlan |
PCPrivacyCleaner |
PCSafe |
Pest-Patrol |
PornClenser |
Power-Scan |
PrivacyGuarantor |
RealAV |
RegistryCare |
SaferScan |
ScanAndRepairUtilities |
Spyblaster |
Spy-Rid |
Spy-Speed |
SpywareScanner |
SpyViperPro |
TheSpywareDetective |
TrustSoftAntiSpyware |
WindowsAntivirus 2008 |
XPCleaner |
XPSecurityCenter |
I-Kerberos |
TROJANS |
Win32.Trojan.Aditer |
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system. |
Win32.Trojan.AI |
Win32.Trojan.Anakha |
Win32.Trojan.Angriff |
Win32.Trojan.Anita |
Win32.Trojan.AntiBTC |
Win32.Trojan.AOLmess |
Win32.Trojan.AphexSniffer |
Win32.Trojan.Asit |
Win32.Trojan.Aspam |
Win32.Trojan.Autorun |
Win32.Trojan.AvPatch |
Win32.Trojan.BackRD |
Win32.Trojan.Bakaki |
Win32.Trojan.Bizten |
Win32.Trojan.BleemFake |
Win32.Trojan.Canida |
Win32.Trojan.Clickmaster |
Win32.Trojan.CpuHog |
Win32.Trojan.DCom |
Win32.Trojan.Delcommand |
Win32.Trojan.DelExe |
Win32.Trojan.Deltree |
Win32.Trojan.Dopen |
Win32.Trojan.Drone |
Win32.Trojan.Easyget |
Win32.Trojan.EliteBar |
Win32.Trojan.Eraser |
Win32.Trojan.Errorpage |
Win32.Trojan.EuroSol |
Win32.Trojan.Exploit |
Win32.Trojan.ExtCreator |
Win32.Trojan.FakeHotmail |
Win32.Trojan.FakeIcq |
Win32.Trojan.FakeIrc |
Win32.Trojan.Fakeyah |
Win32.Trojan.FalseQQ |
Win32.Trojan.Filecoder |
Win32.Trojan.FlashZero |
Win32.Trojan.Flood |
Win32.Trojan.FormatC |
Win32.Trojan.Frog |
Win32.Trojan.Geef |
Win32.Trojan.Genlot |
Win32.Trojan.GenteeKiller |
Win32.Trojan.Gibon |
Win32.Trojan.Glieder |
Win32.Trojan.Gnot |
Win32.Trojan.HLS |
Win32.Trojan.Icekboy |
Win32.Trojan.ICKiller |
Win32.Trojan.ICQPager |
Win32.Trojan.ICQPush |
Win32.Trojan.IEThief |
Win32.Trojan.Ikmet |
Win32.Trojan.Koko |
Win32.Trojan.Laoshen |
Win32.Trojan.Loveadot |
Win32.Trojan.Madtol |
Win32.Trojan.MakeCall |
Win32.Trojan.Malantern |
Win32.Trojan.ManifestDestiny |
Win32.Trojan.Marke |
Win32.Trojan.Mirkillerv |
Win32.Trojan.Monicker |
Win32.Trojan.MsgGhost |
Win32.Trojan.MSNCookier |
Win32.Trojan.Mucks |
Win32.Trojan.NuclearPrank |
Win32.Trojan.NucScan |
Win32.Trojan.NulNuler |
Win32.Trojan.Pager |
Win32.Trojan.Paltus |
Win32.Trojan.Piorio |
Win32.Trojan.Pisatel |
Win32.Trojan.PreLoad123 |
Win32.Trojan.Privoxy |
Win32.Trojan.Puto |
Win32.Trojan.RegKill |
Win32.Trojan.Renamer |
Win32.Trojan.RKPort |
Win32.Trojan.RunKeys |
Win32.Trojan.Rux |
Win32.Trojan.Sadenav |
Win32.Trojan.Sevgi |
Win32.Trojan.ShareAll |
Win32.Trojan.Sharer |
Win32.Trojan.Snatch |
Win32.Trojan.Steal |
Win32.Trojan.SubSys |
Win32.Trojan.SysWin |
Win32.Trojan.Term |
Win32.Trojan.Vacuf |
Win32.Trojan.VBTag |
Win32.Trojan.Whiter |
Win32.Trojan.WinHalt |
Win32.Trojan.WinMX |
Win32.Trojan.VirusWizard |
Win32.Trojan.WS |
Win32.Trojan.Xombe |
Win32.Trojan.ZoneKiller |
TROJAN.CLICKERS |
Win32.TrojanClicker.Bitdefener |
Trojan.Clickers may cause the victim’s machine to contact a target webpage without the user’s knowledge or consent to falsify data about the number of times the webpage is visited. |
Win32.TrojanClicker.Outwar |
Win32.TrojanClicker.XMedia |
Win32.TrojanClicker.Zasil |
TROJAN DDOS APPLICATIONS |
Win32.TrojanDDoS.Agent |
TrojanDDoS applications provide functionality that make it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive. |
Win32.TrojanDDoS.Boxed |
TROJAN.DROPPERS |
Win32.TrojanDropper.Crackz |
Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders. |
Win32.Trojan-Dropper.Decept |
Win32.Trojan-Dropper.EachNet |
Win32.Trojan-Dropper.Factory |
Win32.Trojan-Dropper.Fearless |
Win32.Trojan-Dropper.FileBundle |
Win32.Trojan-Dropper.GoBind |
Win32.Trojan-Dropper.GreenStuff |
Win32.Trojan-Dropper.Gwbinder |
Win32.TrojanDropper.InstallDisk |
Win32.Trojan-Dropper.Krepper |
Win32.Trojan-Dropper.Levil |
Win32.Trojan-Dropper.MJoiner |
Win32.Trojan-Dropper.MultiBinder |
Win32.Trojan-Dropper.NeondurJoiner |
Win32.Trojan-Dropper.PeStaple |
Win32.Trojan-Dropper.Proha |
Win32.Trojan-Dropper.Sbind |
Win32.Trojan-Dropper.SennaOneMaker |
Win32.Trojan-Dropper.SpyAgent |
Win32.Trojan-Dropper.Tophead |
Win32.Trojan-Dropper.Traeger |
Win32.Trojan-Dropper.Troman |
TROJAN.NOTIFIERS |
Win32.TrojanNotifier.Cloudine |
Trojan.Notifiers are Trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing system vulnerability. Trojan.Notifiers may thereby compromise system security and user privacy. |
Win32.TrojanNotifier.Devious |
Win32.TrojanNotifier.Elfnotify |
Win32.TrojanNotifier.Gnome |
Win32.TrojanNotifier.Gnotify |
Win32.TrojanNotifier.Inotifier |
Win32.TrojanNotifier.Kipnot |
Win32.TrojanNotifier.Kpager |
Win32.TrojanNotifier.Mutapager |
Win32.TrojanNotifier.Nawai |
Win32.TrojanNotifier.OptixPager |
Win32.TrojanNotifier.QQSendMess |
Win32.TrojanNotifier.SykePager |
Win32.TrojanNotifier.Synen |
TROJAN.PROXIES |
Win32.TrojanProxy.Cidra |
Trojan.Proxies may open up the infected machine to be used as a proxy server. |
Win32.TrojanProxy.Inspir |
Win32.TrojanProxy.Migmaf |
Win32.TrojanProxy.Omnitex |
TROJAN.SPIES |
Win32.TrojanSpy.Apophis |
Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses. |
Win32.TrojanSpy.Chazer |
Win32.TrojanSpy.Conexyo |
Win32.TrojanSpy.Conspy |
Win32.TrojanSpy.CQMA |
Win32.TrojanSpy.DarkOmen |
Win32.TrojanSpy.DiabloKeys |
Win32.TrojanSpy.GreenScreen |
Win32.TrojanSpy.GWGhost |
Win32.TrojanSpy.Hookit |
Win32.TrojanSpy.Iehack |
Win32.TrojanSpy.Janet |
Win32.TrojanSpy.KeybThief |
Win32.TrojanSpy.KeyGhost |
Win32.TrojanSpy.KeyKiller |
Win32.TrojanSpy.KGSpy |
Win32.TrojanSpy.Klogger |
Win32.TrojanSpy.KSniff |
Win32.TrojanSpy.Locha |
Win32.TrojanSpy.Luhn |
Win32.TrojanSpy.Mailspy |
Win32.TrojanSpy.Matman |
Win32.TrojanSpy.MLWatch |
Win32.TrojanSpy.Msgate |
Win32.TrojanSpy.Mxsender |
Win32.TrojanSpy.Negett |
Win32.TrojanSpy.Passkiller |
Win32.TrojanSpy.Quatro |
Win32.TrojanSpy.Redcod |
Win32.TrojanSpy.RemoteKeyLog |
Win32.TrojanSpy.RemoteSniffer |
Win32.TrojanSpy.Satur |
Win32.TrojanSpy.Sepuf |
Win32.TrojanSpy.Sigtar |
Win32.TrojanSpy.Sinred |
Win32.TrojanSpy.Snag |
Win32.TrojanSpy.Srdl |
Win32.TrojanSpy.SSKC |
Win32.TrojanSpy.Tjm |
Win32.TrojanSpy.UltimSpy |
Win32.TrojanSpy.Xlog |
WORMS |
Win32.P2PWorm.Adil |
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user. |
Win32.P2PWorm.Agobot |
Win32.P2PWorm.Archivarius |
Win32.P2PWorm.Backterra |
Win32.P2PWorm.Banuris |
Win32.P2PWorm.Bare |
Win32.P2PWorm.Benjamin |
Win32.P2PWorm.Blandie |
Win32.P2PWorm.Blinkom |
Win32.P2PWorm.Bonet |
Win32.P2PWorm.Capside |
Win32.P2PWorm.Compux |
Win32.P2PWorm.Darby |
Win32.P2PWorm.Darker |
Win32.P2PWorm.Delf |
Win32.P2PWorm.Duload |
Win32.P2PWorm.Evibot |
Win32.P2PWorm.Flowex |
Win32.P2PWorm.Gemel |
Win32.P2PWorm.Kabak |
Win32.P2PWorm.Kazmor |
Win32.P2PWorm.Kifie |
Win32.P2PWorm.Kovirz |
Win32.P2PWorm.Licia |
Win32.P2PWorm.Niklas |
Win32.P2PWorm.Opex |
Win32.P2PWorm.PeerBot |
Win32.P2PWorm.Perenast |
Win32.P2PWorm.Primat |
Win32.P2PWorm.Relmony |
Win32.P2PWorm.Reur |
Win32.P2PWorm.Sambud |
Win32.P2PWorm.Skater |
Win32.P2PWorm.Smeagol |
Win32.P2PWorm.Spear |
Win32.P2PWorm.Specx |
Win32.P2PWorm.SpyBot |
Win32.P2PWorm.SuperLamer |
Win32.P2PWorm.Symop |
Win32.Worm.Alanis |
Win32.Worm.Alcobul |
Win32.Worm.Anarch |
Win32.Worm.Anel |
Win32.Worm.Antites |
Win32.Worm.Apbost |
Win32.Worm.Aplore |
Win32.Worm.Ardurk |
Win32.Worm.Arica |
Win32.Worm.Assarm |
Win32.Worm.Atak |
Win32.Worm.Axam |
Win32.Worm.Badtrans |
Win32.Worm.Batzback |
Win32.Worm.Beglur |
Win32.Worm.Benatic |
Win32.Worm.Bonorm |
Win32.Worm.Boohoo |
Win32.Worm.Bridex |
Win32.Worm.Buzill |
Win32.Worm.Byzer |
Win32.Worm.Calgary |
Win32.Worm.Calposa |
Win32.Worm.Cazinat |
Win32.Worm.Centar |
Win32.Worm.Cheri |
Win32.Worm.CodeGreen |
Win32.Worm.Duksten |
Win32.Worm.Ecopic |
Win32.Worm.Elman |
Win32.Worm.Firkin |
Win32.Worm.Fleming |
Win32.Worm.Foxma |
Win32.Worm.Fozer |
Win32.Worm.FunnyPics |
Win32.Worm.Godog |
Win32.Worm.Hanged |
Win32.Worm.Happy |
Win32.Worm.Hawawi |
Win32.Worm.Headline |
Win32.Worm.Hermes |
Win32.Worm.Hermon |
Win32.Worm.Hobex |
Win32.Worm.Holar |
Win32.Worm.Hopalon |
Win32.Worm.IISWorm |
Win32.Worm.Jantic |
Win32.Worm.Kamar |
Win32.Worm.Kameral |
Win32.Worm.Lara |
Win32.Worm.Lasbat |
Win32.Worm.LastWord |
Win32.Worm.Lespaul |
Win32.Worm.Longbe |
Win32.Worm.Lynder |
Win32.Worm.Magold |
Win32.Worm.Manymize |
Win32.Worm.Mapson |
Win32.Worm.Menger |
Win32.Worm.Menlogon |
Win32.Worm.Microyano |
Win32.Worm.Mintal |
Win32.Worm.Moncher |
Win32.Worm.MSN |
Win32.Worm.MyParty |
Win32.Worm.MyPower |
Win32.Worm.Myspch |
Win32.Worm.Netpree |
Win32.Worm.Netsp |
Win32.Worm.NHKR |
Win32.Worm.Nimda |
Win32.Worm.Nimrod |
Win32.Worm.OldSpot |
Win32.Worm.Onver |
Win32.Worm.Osbourne |
Win32.Worm.Plea |
Win32.Worm.Pnguin |
Win32.Worm.PonyExpress |
Win32.Worm.Poo |
Win32.Worm.Postman |
Win32.Worm.Povgon |
Win32.Worm.Raleka |
Win32.Worm.Rastam |
Win32.Worm.Razac |
Win32.Worm.Recory |
Win32.Worm.Redesi |
Win32.Worm.Registra |
Win32.Worm.Repah |
Win32.Worm.Revel |
Win32.Worm.Rexli |
Win32.Worm.Roach |
Win32.Worm.Roaller |
Win32.Worm.Ronoper |
Win32.Worm.Ruft |
Win32.Worm.RussoTuristo |
Win32.Worm.Rusty |
Win32.Worm.Sabak |
Win32.Worm.Sabia |
Win32.Worm.Sahay |
Win32.Worm.Sandra |
Win32.Worm.Scaline |
Win32.Worm.Scrambler |
Win32.Worm.Seliz |
Win32.Worm.Serotin |
Win32.Worm.Sexer |
Win32.Worm.Silver |
Win32.Worm.Sint |
Win32.Worm.Sivel |
Win32.Worm.Skowor |
Win32.Worm.Snapper |
Win32.Worm.Soda |
Win32.Worm.Solow |
Win32.Worm.Soltern |
Win32.Worm.Sorin |
Win32.Worm.Stina |
Win32.Worm.Stopin |
Win32.Worm.Sucon |
Win32.Worm.Suppl |
Win32.Worm.Sysnom |
Win32.Worm.Taz |
Win32.Worm.Tettona |
Win32.Worm.Thonic |
Win32.Worm.Trance |
Win32.Worm.Trood |
Win32.Worm.Ulrick |
Win32.Worm.Unicle |
Win32.Worm.Unis |
Win32.Worm.Wallon |
Win32.Worm.Wangy |
Win32.Worm.Viled |
Win32.Worm.Winevar |
Win32.Worm.Winext |
Win32.Worm.Youzer |
Win32.Worm.Yoxec |
Win32.Worm.Yoyks |
Win32.Worm.Zezer |
Win32.IRCWorm.Momma |
MISCELLANEOUS MALWARE |
This grouping contains programs with malicious intentions, including backdoors and Trojans. |
HiYo |
HiYo is an instant messenger plug in. The application runs constantly in the background, even when the instant messenger client is not running, giving no indication as to its purpose. It does not pose a serious risk to security or privacy although the quality of choices available to the user in terms of installation and configuration are questionable. Users are advised to read the application’s EULA and privacy policy. |
Win32.FakeCodec.Light-Codec |
Win32.FakeCodec.Light-Codec is a Zlob fake codec installer. It installs a rootkit which changes the DNS name lookup results. It may also be used for phishing and other malicious purposes. The rootkit prevents its removal by hiding its presence by concealing running processes, files or data from the infected operating system. The malware may not be detected by system utilities, security related applications nor by the users on the infected system. This malware may have to be removed manually. Affected users may seek further help at Lavasoft Support Forums. |
Win32.Hoax.Bravia |
Win32.Hoax.Bravia is a joke program that may mimic the actions of other applications causing different forms of false alerts. It may also download other software automatically to the system, for example, rogue anti-spyware applications. |
Win32.Hoax.SMFree |
Win32.Hoax.SMFree is a joke program that may mimic the actions of other applications causing different forms of false alerts. It may also download other software automatically to the system, for example, rogue anti-spyware applications. |
Win32.Packed.NSAnti |
Win32.Packed.NSAnti installs itself as a Trojan. It may also download additional files to the infected system. |
Win32.SpamTool.Blen |
Win32.SpamTool.Blen is used to send e-mails from infected computers. |
Win32.SpamTool.Small |
Win32.SpamTool.Small is used to send e-mails from infected computers. |
Win32.SpamTool.VB |
Win32.SpamTool.VB is used to send e-mails from infected computers. |
TAI – Threat Analysis Index
The Lavasoft Threat Analysis Index (TAI) system is based on a 10-point scale, with 1 representing the lowest threat and 10 representing the highest. The behavior of the program has more influence when assigning TAI points than the actual technical aspects of the malware. In other words, if the malware secretly attaches without the computer user’s full understanding and approval, then it will automatically be given higher TAI points. A minimum TAI value of 3 is required before the malware is put into detection. Read more on the Lavasoft Security Center here.