Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lavasoft: New Targets in Detection (June 2008)

ADWARE Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Adware.DealHelper Adware.DealHelper is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.DirectWeb Adware.DirectWeb is a potentially unwanted program that displays advertisements and may send information about the user back to its server. Adware.DirectWeb is of Korean origin.
ADWARE Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Adware.DealHelper Adware.DealHelper is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.DirectWeb Adware.DirectWeb is a potentially unwanted program that displays advertisements and may send information about the user back to its server. Adware.DirectWeb is of Korean origin.
Adware.Emuleside Adware.Emuleside is a potentially unwanted program that displays advertisements and may send information about the user back to its server. Adware.Emuleside is of Korean origin.
Adware.TheSpaceZone Adware.TheSpaceZone is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Tradfic Adware.Tradfic is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.VirtualNetwork Adware.VirtualNetwork is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Toolbar.Anqurio Toolbar.Anqurio is a search toolbar which is missing both Privacy Policy and EULA prior to installation. The toolbar is also installed on all user accounts and provides an unfunctional uninstaller.

 

BACKDOORS
Win32.Backdoor.Altice Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim’s machine.
Win32.Backdoor.Chfiji
Win32.Backdoor.DM
Win32.Backdoor.DMX
Win32.Backdoor.DnsDoor
Win32.Backdoor.Dominador
Win32.Backdoor.Dopedoor
Win32.Backdoor.DP
Win32.Backdoor.DTR
Win32.Backdoor.Ducktoy
Win32.Backdoor.Duddie
Win32.Backdoor.Dzyckz
Win32.Backdoor.Easyserv
Win32.Backdoor.Eclipse
Win32.Backdoor.EEYE
Win32.Backdoor.Elfrit
Win32.Backdoor.Enculator
Win32.Backdoor.Eret
Win32.Backdoor.Executor
Win32.Backdoor.ExploitDoor
Win32.Backdoor.Exploiter
Win32.Backdoor.Express
Win32.Backdoor.Fakemanga
Win32.Backdoor.FallingDoor
Win32.Backdoor.Farfli
Win32.Backdoor.Fatcon
Win32.Backdoor.Fatroj
Win32.Backdoor.FC
Win32.Backdoor.Feap
Win32.Backdoor.Fof
Win32.Backdoor.Fonly
Win32.Backdoor.ForcedEntry
Win32.Backdoor.Fore
Win32.Backdoor.FoxEyes
Win32.Backdoor.FraggleLite
Win32.Backdoor.FraggleRock
Win32.Backdoor.Freak
Win32.Backdoor.Freddy
Win32.Backdoor.Freegate
Win32.Backdoor.Frenzy
Win32.Backdoor.Froobot
Win32.Backdoor.FTP.Digund
Win32.Backdoor.Fulamer
Win32.Backdoor.FunFactory
Win32.Backdoor.fyeo
Win32.Backdoor.GateHell
Win32.Backdoor.Gayol
Win32.Backdoor.GDoor
Win32.Backdoor.Getpass
Win32.Backdoor.GF
Win32.Backdoor.GGDoor
Win32.Backdoor.Ghost
Win32.Backdoor.GhostVoice
Win32.Backdoor.GirlBoy
Win32.Backdoor.Goh
Win32.Backdoor.Grobodor
Win32.Backdoor.Gspot
Win32.Backdoor.GWGirl
Win32.Backdoor.Hackboy
Win32.Backdoor.Hackdoor
Win32.Backdoor.HackerHeaven
Win32.Backdoor.HacPing
Win32.Backdoor.Hanuman
Win32.Backdoor.HatFiend
Win32.Backdoor.Havoc
Win32.Backdoor.Hellza
Win32.Backdoor.Hoaveldoor
Win32.Backdoor.Hoavelu
Win32.Backdoor.Hoaxer
Win32.Backdoor.Hobbit
Win32.Backdoor.HoneyPot
Win32.Backdoor.HostControl
Win32.Backdoor.Huigezi
Win32.Backdoor.Hurmandor
Win32.Backdoor.HVL-rat
Win32.Backdoor.HydroLeak
Win32.Backdoor.Iblisdoor
Win32.Backdoor.IcmpCmd
Win32.Backdoor.Iddono
Win32.Backdoor.Iemm
Win32.Backdoor.Ierk
Win32.Backdoor.InCommand
Win32.Backdoor.Indexer
Win32.Backdoor.InetSpy
Win32.Backdoor.Infexor
Win32.Backdoor.Infinaeon
Win32.Backdoor.Inkill
Win32.Backdoor.Invisdoor
Win32.Backdoor.Irtih
Win32.Backdoor.Jes
Win32.Backdoor.Jinmoze
Win32.Backdoor.Kaos
Win32.Backdoor.KeyStart
Win32.Backdoor.Kidterror
Win32.Backdoor.Killdientes
Win32.Backdoor.Kilo
Win32.Backdoor.Kingos
Win32.Backdoor.Kokodoor
Win32.Backdoor.Konik
Win32.Backdoor.Koretek
Win32.Backdoor.Kraimer
Win32.Backdoor.Kryptonic
Win32.Backdoor.Kwak
Win32.Backdoor.KWM
Win32.Backdoor.Kyrdor
Win32.Backdoor.Lastdoor
Win32.Backdoor.LazyAdmin
Win32.Backdoor.LeGuardien
Win32.Backdoor.Leniv
Win32.Backdoor.Lesbot
Win32.Backdoor.Levelone
Win32.Backdoor.Likun
Win32.Backdoor.Liondoor
Win32.Backdoor.Lmir
Win32.Backdoor.Lybdoor
Win32.Backdoor.Maniador
Win32.Backdoor.Manipulator
Win32.Backdoor.Mantice
Win32.Backdoor.Mapsy
Win32.Backdoor.Mard
Win32.Backdoor.Massaker
Win32.Backdoor.MasterParadise
Win32.Backdoor.Matrix
Win32.Backdoor.Mayhdoor
Win32.Backdoor.Messah
Win32.Backdoor.Messo
Win32.Backdoor.Metal
Win32.Backdoor.Mhtserv
Win32.Backdoor.MicroSpy
Win32.Backdoor.Mierun
Win32.Backdoor.Millenium
Win32.Backdoor.Minigift
Win32.Backdoor.Miniglitch
Win32.Backdoor.MiniKeyLog
Win32.Backdoor.Minilash
Win32.Backdoor.mmcs
Win32.Backdoor.Mneah
Win32.Backdoor.Monator
Win32.Backdoor.MSBot
Win32.Backdoor.Nabshell
Win32.Backdoor.Napalm
Win32.Backdoor.NBSpy
Win32.Backdoor.NeoArk
Win32.Backdoor.NetAdmin
Win32.Backdoor.NetAdvance
Win32.Backdoor.NetBoy
Win32.Backdoor.NetBull
Win32.Backdoor.NetControl
Win32.Backdoor.Netdex
Win32.Backdoor.NetDown
Win32.Backdoor.NetHack
Win32.Backdoor.NetKat32
Win32.Backdoor.Netministartor
Win32.Backdoor.Netpocalipse
Win32.Backdoor.NetRunner
Win32.Backdoor.NetShadow
Win32.Backdoor.Netso
Win32.Backdoor.Neworld
Win32.Backdoor.Nirvana
Win32.Backdoor.Noknok
Win32.Backdoor.NoNeed
Win32.Backdoor.Noxcape
Win32.Backdoor.NTHack
Win32.Backdoor.Olive
Win32.Backdoor.Onever
Win32.Backdoor.Opwin
Win32.Backdoor.Osirdoor
Win32.Backdoor.Oxon
Win32.Backdoor.PcControl
Win32.Backdoor.PCInvader
Win32.Backdoor.Peanut
Win32.Backdoor.Peeper
Win32.Backdoor.Peers
Win32.Backdoor.Pointex
Win32.Backdoor.Polodor
Win32.Backdoor.PolterGeist
Win32.Backdoor.PPdoor
Win32.Backdoor.Prayer
Win32.Backdoor.Precursor
Win32.Backdoor.Prexot
Win32.Backdoor.Priority
Win32.Backdoor.Probot
Win32.Backdoor.Progenic
Win32.Backdoor.Pulpit
Win32.Backdoor.QICQSearch
Win32.Backdoor.Qwin
Win32.Backdoor.R3C
Win32.Backdoor.Raid
Win32.Backdoor.RATCracker
Win32.Backdoor.Rathead
Win32.Backdoor.RATPack
Win32.Backdoor.SevenSphere
Win32.Backdoor.Shador
WIn32.Backdoor.Shang
Win32.Backdoor.SilentSpy
Win32.Backdoor.Skun
Win32.Backdoor.Snape
Win32.Backdoor.SQLConnect
Win32.Backdoor.Taladrator
Win32.Backdoor.TheThing
Win32.Backdoor.UpRootKit
Win32.Backdoor.VBot
Win32.Backdoor.Webex

 

DOWNLOADERS
Win32.TrojanDownloader.Acset Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.Crypter
Win32.TrojanDownloader.Loan
Win32.TrojanDownloader.Pacer
Win32.TrojanDownloader.Slime
Win32.TrojanDownloader.Spig

 

FLOODERS
Win32.Flooder.Agent Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive. This is similar to a DDoS attack, where a massive amount of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.
Win32.Flooder.Fludp
Win32.Flooder.Fofeet
Win32.Flooder.Hmast
Win32.Flooder.Ipt
Win32.Flooder.Killzone
Win32.Flooder.Live
Win32.Flooder.MadMessenger

 

MONITORS
Win32.Monitor.007SpySoft Monitors are surveillance tools that, for example, monitor a user’s keystrokes, and therefore may compromise a user’s privacy if used in a malicious manner.
Win32.Monitor.ActivityKeyLogger
Win32.Monitor.Chpie
Win32.Monitor.Dafunk
Win32.Monitor.ImSurfSent
Win32.Monitor.MGS
Win32.Monitor.MsnMon
Win32.Monitor.PersonalInspector
Win32.Monitor.RealSpy
Win32.Monitor.RevKeyLogger
Win32.Monitor.SpectorPro
Win32.Monitor.StealthKeylogger
Win32.Monitor.X1Spy

 

NUKERS
Win32.Nuker.7thSphere Nukers are used to harm other computers over the Internet, making them crash or reboot.
Win32.Nuker.Aic
Win32.Nuker.NTKiller
Win32.Nuker.Nukem
Win32.Nuker.WNuke32

 

PASSWORD STEALERS
Win32.Trojan-PSW.AlLight Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.Trojan-PSW.Widget
Win32.TrojanPWS.Abot
Win32.TrojanPWS.AccountHunter
Win32.TrojanPWS.AIMJaker
Win32.TrojanPWS.AimTroj
Win32.TrojanPWS.Ajan
Win32.TrojanPWS.Algus
Win32.TrojanPWS.Antigen
Win32.TrojanPWS.Atrojan
Win32.TrojanPWS.Barok
Win32.TrojanPWS.Barrio
Win32.TrojanPWS.Billy
Win32.TrojanPWS.Blaver
Win32.TrojanPWS.BStroj
Win32.Trojan-PWS.DnsTroj
Win32.Trojan-PWS.Dob
Win32.Trojan-PWS.DoichBunk
Win32.Trojan-PWS.EBTReporter
Win32.Trojan-PWS.Executant
Win32.Trojan-PWS.F17
Win32.Trojan-PWS.Fantast
Win32.Trojan-PWS.Fente
Win32.Trojan-PWS.FIU
Win32.Trojan-PWS.Flystudio
Win32.Trojan-PWS.Gadu
Win32.Trojan-PWS.Gametea
Win32.Trojan-PWS.Gamey
Win32.Trojan-PWS.Ghostar
Win32.Trojan-PWS.GinaPass
Win32.Trojan-PWS.GOPtrojan
Win32.Trojan-PWS.Hacksoft
Win32.Trojan-PWS.Hearty
Win32.Trojan-PWS.Horse
Win32.Trojan-PWS.ICQ2k
Win32.Trojan-PWS.INet20
Win32.Trojan-PWS.Inverse
Win32.Trojan-PWS.Jiang
Win32.Trojan-PWS.Johan
Win32.Trojan-PWS.Justas
Win32.Trojan-PWS.Kesk
Win32.Trojan-PWS.KeyStealer
Win32.Trojan-PWS.LamerLite
Win32.Trojan-PWS.Lamot
Win32.Trojan-PWS.Lizgo
Win32.Trojan-PWS.Mirpn
Win32.Trojan-PWS.MMmtask
Win32.Trojan-PWS.Najort
Win32.Trojan-PWS.Naughter
Win32.Trojan-PWS.Needinfo
Win32.Trojan-PWS.Neman
Win32.Trojan-PWS.Neol
Win32.Trojan-PWS.Note
Win32.Trojan-PWS.Organer
Win32.Trojan-PWS.Overtron
Win32.Trojan-PWS.Pec
Win32.Trojan-PWS.PM
Win32.Trojan-PWS.PMAIL
Win32.Trojan-PWS.PMT
Win32.Trojan-PWS.Pwkiller
Win32.Trojan-PWS.PVStealth
Win32.Trojan-PWS.Stealth
Win32.Trojan-PWS.Sysrater
Win32.Trojan-PWS.Sysrer
Win32.Trojan-PWS.Tanspy
Win32.Trojan-PWS.Tapiras
Win32.Trojan-PWS.Telsender
Win32.Trojan-PWS.Teman
Win32.Trojan-PWS.TestSpy
Win32.Trojan-PWS.THG
Win32.Trojan-PWS.Thief
Win32.Trojan-PWS.Tiant
Win32.Trojan-PWS.Timsy
Win32.Trojan-PWS.T-Online
Win32.Trojan-PWS.Traceboy
Win32.Trojan-PWS.Trah
Win32.Trojan-PWS.Unite
Win32.Trojan-PWS.Watcher
Win32.Trojan-PWS.Weird
Win32.Trojan-PWS.Vingrad
Win32.Trojan-PWS.Wintcp
Win32.Trojan-PWS.Wortron
Win32.Trojan-PWS.Vovan
Win32.Trojan-PWS.Xilon
Win32.Trojan-PWS.XPassLogger
Win32.Trojan-PWS.Yahoo.Awjer
Win32.Trojan-PWS.Yahoo.Nagil
Win32.Trojan-PWS.Yahoo.YPager
Win32.Trojan-PWS.YahooPass
Win32.Trojan-PWS.Zimenok
Win32.Trojan-PWS.Zombie
Win32.Trojan-PWS-Pasorot

 

ROGUE ANTI-SPYWARE APPLICATIONS
AdvancedXPDefender Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
AdvancedXPFixer
CrisystecSentry
Defenza
EliteProtector
KvmSecure
MalwarePatrolPro
MasterAntiVirus
MySpyProtector
No Adware
PCHealthPlan
PCPrivacyCleaner
PCSafe
Pest-Patrol
PornClenser
Power-Scan
PrivacyGuarantor
RealAV
RegistryCare
SaferScan
ScanAndRepairUtilities
Spyblaster
Spy-Rid
Spy-Speed
SpywareScanner
SpyViperPro
TheSpywareDetective
TrustSoftAntiSpyware
WindowsAntivirus 2008
XPCleaner
XPSecurityCenter
I-Kerberos

 

TROJANS
Win32.Trojan.Aditer Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.AI
Win32.Trojan.Anakha
Win32.Trojan.Angriff
Win32.Trojan.Anita
Win32.Trojan.AntiBTC
Win32.Trojan.AOLmess
Win32.Trojan.AphexSniffer
Win32.Trojan.Asit
Win32.Trojan.Aspam
Win32.Trojan.Autorun
Win32.Trojan.AvPatch
Win32.Trojan.BackRD
Win32.Trojan.Bakaki
Win32.Trojan.Bizten
Win32.Trojan.BleemFake
Win32.Trojan.Canida
Win32.Trojan.Clickmaster
Win32.Trojan.CpuHog
Win32.Trojan.DCom
Win32.Trojan.Delcommand
Win32.Trojan.DelExe
Win32.Trojan.Deltree
Win32.Trojan.Dopen
Win32.Trojan.Drone
Win32.Trojan.Easyget
Win32.Trojan.EliteBar
Win32.Trojan.Eraser
Win32.Trojan.Errorpage
Win32.Trojan.EuroSol
Win32.Trojan.Exploit
Win32.Trojan.ExtCreator
Win32.Trojan.FakeHotmail
Win32.Trojan.FakeIcq
Win32.Trojan.FakeIrc
Win32.Trojan.Fakeyah
Win32.Trojan.FalseQQ
Win32.Trojan.Filecoder
Win32.Trojan.FlashZero
Win32.Trojan.Flood
Win32.Trojan.FormatC
Win32.Trojan.Frog
Win32.Trojan.Geef
Win32.Trojan.Genlot
Win32.Trojan.GenteeKiller
Win32.Trojan.Gibon
Win32.Trojan.Glieder
Win32.Trojan.Gnot
Win32.Trojan.HLS
Win32.Trojan.Icekboy
Win32.Trojan.ICKiller
Win32.Trojan.ICQPager
Win32.Trojan.ICQPush
Win32.Trojan.IEThief
Win32.Trojan.Ikmet
Win32.Trojan.Koko
Win32.Trojan.Laoshen
Win32.Trojan.Loveadot
Win32.Trojan.Madtol
Win32.Trojan.MakeCall
Win32.Trojan.Malantern
Win32.Trojan.ManifestDestiny
Win32.Trojan.Marke
Win32.Trojan.Mirkillerv
Win32.Trojan.Monicker
Win32.Trojan.MsgGhost
Win32.Trojan.MSNCookier
Win32.Trojan.Mucks
Win32.Trojan.NuclearPrank
Win32.Trojan.NucScan
Win32.Trojan.NulNuler
Win32.Trojan.Pager
Win32.Trojan.Paltus
Win32.Trojan.Piorio
Win32.Trojan.Pisatel
Win32.Trojan.PreLoad123
Win32.Trojan.Privoxy
Win32.Trojan.Puto
Win32.Trojan.RegKill
Win32.Trojan.Renamer
Win32.Trojan.RKPort
Win32.Trojan.RunKeys
Win32.Trojan.Rux
Win32.Trojan.Sadenav
Win32.Trojan.Sevgi
Win32.Trojan.ShareAll
Win32.Trojan.Sharer
Win32.Trojan.Snatch
Win32.Trojan.Steal
Win32.Trojan.SubSys
Win32.Trojan.SysWin
Win32.Trojan.Term
Win32.Trojan.Vacuf
Win32.Trojan.VBTag
Win32.Trojan.Whiter
Win32.Trojan.WinHalt
Win32.Trojan.WinMX
Win32.Trojan.VirusWizard
Win32.Trojan.WS
Win32.Trojan.Xombe
Win32.Trojan.ZoneKiller

 

TROJAN.CLICKERS
Win32.TrojanClicker.Bitdefener Trojan.Clickers may cause the victim’s machine to contact a target webpage without the user’s knowledge or consent to falsify data about the number of times the webpage is visited.
Win32.TrojanClicker.Outwar
Win32.TrojanClicker.XMedia
Win32.TrojanClicker.Zasil

 

TROJAN DDOS APPLICATIONS
Win32.TrojanDDoS.Agent TrojanDDoS applications provide functionality that make it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Boxed

 

TROJAN.DROPPERS
Win32.TrojanDropper.Crackz Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders.
Win32.Trojan-Dropper.Decept
Win32.Trojan-Dropper.EachNet
Win32.Trojan-Dropper.Factory
Win32.Trojan-Dropper.Fearless
Win32.Trojan-Dropper.FileBundle
Win32.Trojan-Dropper.GoBind
Win32.Trojan-Dropper.GreenStuff
Win32.Trojan-Dropper.Gwbinder
Win32.TrojanDropper.InstallDisk
Win32.Trojan-Dropper.Krepper
Win32.Trojan-Dropper.Levil
Win32.Trojan-Dropper.MJoiner
Win32.Trojan-Dropper.MultiBinder
Win32.Trojan-Dropper.NeondurJoiner
Win32.Trojan-Dropper.PeStaple
Win32.Trojan-Dropper.Proha
Win32.Trojan-Dropper.Sbind
Win32.Trojan-Dropper.SennaOneMaker
Win32.Trojan-Dropper.SpyAgent
Win32.Trojan-Dropper.Tophead
Win32.Trojan-Dropper.Traeger
Win32.Trojan-Dropper.Troman

 

TROJAN.NOTIFIERS
Win32.TrojanNotifier.Cloudine Trojan.Notifiers are Trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing system vulnerability. Trojan.Notifiers may thereby compromise system security and user privacy.
Win32.TrojanNotifier.Devious
Win32.TrojanNotifier.Elfnotify
Win32.TrojanNotifier.Gnome
Win32.TrojanNotifier.Gnotify
Win32.TrojanNotifier.Inotifier
Win32.TrojanNotifier.Kipnot
Win32.TrojanNotifier.Kpager
Win32.TrojanNotifier.Mutapager
Win32.TrojanNotifier.Nawai
Win32.TrojanNotifier.OptixPager
Win32.TrojanNotifier.QQSendMess
Win32.TrojanNotifier.SykePager
Win32.TrojanNotifier.Synen

 

TROJAN.PROXIES
Win32.TrojanProxy.Cidra Trojan.Proxies may open up the infected machine to be used as a proxy server.
Win32.TrojanProxy.Inspir
Win32.TrojanProxy.Migmaf
Win32.TrojanProxy.Omnitex

 

TROJAN.SPIES
Win32.TrojanSpy.Apophis Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.
Win32.TrojanSpy.Chazer
Win32.TrojanSpy.Conexyo
Win32.TrojanSpy.Conspy
Win32.TrojanSpy.CQMA
Win32.TrojanSpy.DarkOmen
Win32.TrojanSpy.DiabloKeys
Win32.TrojanSpy.GreenScreen
Win32.TrojanSpy.GWGhost
Win32.TrojanSpy.Hookit
Win32.TrojanSpy.Iehack
Win32.TrojanSpy.Janet
Win32.TrojanSpy.KeybThief
Win32.TrojanSpy.KeyGhost
Win32.TrojanSpy.KeyKiller
Win32.TrojanSpy.KGSpy
Win32.TrojanSpy.Klogger
Win32.TrojanSpy.KSniff
Win32.TrojanSpy.Locha
Win32.TrojanSpy.Luhn
Win32.TrojanSpy.Mailspy
Win32.TrojanSpy.Matman
Win32.TrojanSpy.MLWatch
Win32.TrojanSpy.Msgate
Win32.TrojanSpy.Mxsender
Win32.TrojanSpy.Negett
Win32.TrojanSpy.Passkiller
Win32.TrojanSpy.Quatro
Win32.TrojanSpy.Redcod
Win32.TrojanSpy.RemoteKeyLog
Win32.TrojanSpy.RemoteSniffer
Win32.TrojanSpy.Satur
Win32.TrojanSpy.Sepuf
Win32.TrojanSpy.Sigtar
Win32.TrojanSpy.Sinred
Win32.TrojanSpy.Snag
Win32.TrojanSpy.Srdl
Win32.TrojanSpy.SSKC
Win32.TrojanSpy.Tjm
Win32.TrojanSpy.UltimSpy
Win32.TrojanSpy.Xlog

 

WORMS
Win32.P2PWorm.Adil Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.P2PWorm.Agobot
Win32.P2PWorm.Archivarius
Win32.P2PWorm.Backterra
Win32.P2PWorm.Banuris
Win32.P2PWorm.Bare
Win32.P2PWorm.Benjamin
Win32.P2PWorm.Blandie
Win32.P2PWorm.Blinkom
Win32.P2PWorm.Bonet
Win32.P2PWorm.Capside
Win32.P2PWorm.Compux
Win32.P2PWorm.Darby
Win32.P2PWorm.Darker
Win32.P2PWorm.Delf
Win32.P2PWorm.Duload
Win32.P2PWorm.Evibot
Win32.P2PWorm.Flowex
Win32.P2PWorm.Gemel
Win32.P2PWorm.Kabak
Win32.P2PWorm.Kazmor
Win32.P2PWorm.Kifie
Win32.P2PWorm.Kovirz
Win32.P2PWorm.Licia
Win32.P2PWorm.Niklas
Win32.P2PWorm.Opex
Win32.P2PWorm.PeerBot
Win32.P2PWorm.Perenast
Win32.P2PWorm.Primat
Win32.P2PWorm.Relmony
Win32.P2PWorm.Reur
Win32.P2PWorm.Sambud
Win32.P2PWorm.Skater
Win32.P2PWorm.Smeagol
Win32.P2PWorm.Spear
Win32.P2PWorm.Specx
Win32.P2PWorm.SpyBot
Win32.P2PWorm.SuperLamer
Win32.P2PWorm.Symop
Win32.Worm.Alanis
Win32.Worm.Alcobul
Win32.Worm.Anarch
Win32.Worm.Anel
Win32.Worm.Antites
Win32.Worm.Apbost
Win32.Worm.Aplore
Win32.Worm.Ardurk
Win32.Worm.Arica
Win32.Worm.Assarm
Win32.Worm.Atak
Win32.Worm.Axam
Win32.Worm.Badtrans
Win32.Worm.Batzback
Win32.Worm.Beglur
Win32.Worm.Benatic
Win32.Worm.Bonorm
Win32.Worm.Boohoo
Win32.Worm.Bridex
Win32.Worm.Buzill
Win32.Worm.Byzer
Win32.Worm.Calgary
Win32.Worm.Calposa
Win32.Worm.Cazinat
Win32.Worm.Centar
Win32.Worm.Cheri
Win32.Worm.CodeGreen
Win32.Worm.Duksten
Win32.Worm.Ecopic
Win32.Worm.Elman
Win32.Worm.Firkin
Win32.Worm.Fleming
Win32.Worm.Foxma
Win32.Worm.Fozer
Win32.Worm.FunnyPics
Win32.Worm.Godog
Win32.Worm.Hanged
Win32.Worm.Happy
Win32.Worm.Hawawi
Win32.Worm.Headline
Win32.Worm.Hermes
Win32.Worm.Hermon
Win32.Worm.Hobex
Win32.Worm.Holar
Win32.Worm.Hopalon
Win32.Worm.IISWorm
Win32.Worm.Jantic
Win32.Worm.Kamar
Win32.Worm.Kameral
Win32.Worm.Lara
Win32.Worm.Lasbat
Win32.Worm.LastWord
Win32.Worm.Lespaul
Win32.Worm.Longbe
Win32.Worm.Lynder
Win32.Worm.Magold
Win32.Worm.Manymize
Win32.Worm.Mapson
Win32.Worm.Menger
Win32.Worm.Menlogon
Win32.Worm.Microyano
Win32.Worm.Mintal
Win32.Worm.Moncher
Win32.Worm.MSN
Win32.Worm.MyParty
Win32.Worm.MyPower
Win32.Worm.Myspch
Win32.Worm.Netpree
Win32.Worm.Netsp
Win32.Worm.NHKR
Win32.Worm.Nimda
Win32.Worm.Nimrod
Win32.Worm.OldSpot
Win32.Worm.Onver
Win32.Worm.Osbourne
Win32.Worm.Plea
Win32.Worm.Pnguin
Win32.Worm.PonyExpress
Win32.Worm.Poo
Win32.Worm.Postman
Win32.Worm.Povgon
Win32.Worm.Raleka
Win32.Worm.Rastam
Win32.Worm.Razac
Win32.Worm.Recory
Win32.Worm.Redesi
Win32.Worm.Registra
Win32.Worm.Repah
Win32.Worm.Revel
Win32.Worm.Rexli
Win32.Worm.Roach
Win32.Worm.Roaller
Win32.Worm.Ronoper
Win32.Worm.Ruft
Win32.Worm.RussoTuristo
Win32.Worm.Rusty
Win32.Worm.Sabak
Win32.Worm.Sabia
Win32.Worm.Sahay
Win32.Worm.Sandra
Win32.Worm.Scaline
Win32.Worm.Scrambler
Win32.Worm.Seliz
Win32.Worm.Serotin
Win32.Worm.Sexer
Win32.Worm.Silver
Win32.Worm.Sint
Win32.Worm.Sivel
Win32.Worm.Skowor
Win32.Worm.Snapper
Win32.Worm.Soda
Win32.Worm.Solow
Win32.Worm.Soltern
Win32.Worm.Sorin
Win32.Worm.Stina
Win32.Worm.Stopin
Win32.Worm.Sucon
Win32.Worm.Suppl
Win32.Worm.Sysnom
Win32.Worm.Taz
Win32.Worm.Tettona
Win32.Worm.Thonic
Win32.Worm.Trance
Win32.Worm.Trood
Win32.Worm.Ulrick
Win32.Worm.Unicle
Win32.Worm.Unis
Win32.Worm.Wallon
Win32.Worm.Wangy
Win32.Worm.Viled
Win32.Worm.Winevar
Win32.Worm.Winext
Win32.Worm.Youzer
Win32.Worm.Yoxec
Win32.Worm.Yoyks
Win32.Worm.Zezer
Win32.IRCWorm.Momma

 

MISCELLANEOUS MALWARE This grouping contains programs with malicious intentions, including backdoors and Trojans.
HiYo HiYo is an instant messenger plug in. The application runs constantly in the background, even when the instant messenger client is not running, giving no indication as to its purpose. It does not pose a serious risk to security or privacy although the quality of choices available to the user in terms of installation and configuration are questionable. Users are advised to read the application’s EULA and privacy policy.
Win32.FakeCodec.Light-Codec Win32.FakeCodec.Light-Codec is a Zlob fake codec installer. It installs a rootkit which changes the DNS name lookup results. It may also be used for phishing and other malicious purposes. The rootkit prevents its removal by hiding its presence by concealing running processes, files or data from the infected operating system. The malware may not be detected by system utilities, security related applications nor by the users on the infected system. This malware may have to be removed manually. Affected users may seek further help at Lavasoft Support Forums.
Win32.Hoax.Bravia Win32.Hoax.Bravia is a joke program that may mimic the actions of other applications causing different forms of false alerts. It may also download other software automatically to the system, for example, rogue anti-spyware applications.
Win32.Hoax.SMFree Win32.Hoax.SMFree is a joke program that may mimic the actions of other applications causing different forms of false alerts. It may also download other software automatically to the system, for example, rogue anti-spyware applications.
Win32.Packed.NSAnti Win32.Packed.NSAnti installs itself as a Trojan. It may also download additional files to the infected system.
Win32.SpamTool.Blen Win32.SpamTool.Blen is used to send e-mails from infected computers.
Win32.SpamTool.Small Win32.SpamTool.Small is used to send e-mails from infected computers.
Win32.SpamTool.VB Win32.SpamTool.VB is used to send e-mails from infected computers.

TAI – Threat Analysis Index
The Lavasoft Threat Analysis Index (TAI) system is based on a 10-point scale, with 1 representing the lowest threat and 10 representing the highest. The behavior of the program has more influence when assigning TAI points than the actual technical aspects of the malware. In other words, if the malware secretly attaches without the computer user’s full understanding and approval, then it will automatically be given higher TAI points. A minimum TAI value of 3 is required before the malware is put into detection. Read more on the Lavasoft Security Center here.

Threat Analysis (TA) Index

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...