June 2008

New Targets in Detection (May 2008)

ADWARE Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Adwaer.NBar Adwaer.NBar installs itself as a Browser Helper Object. It may cause pop-up and pop-under advertisements.
Adware.AdStart Adware.AdStart is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Chiem Adware.Chiem is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Cres Adware.Cres is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.DelphinMediaViewer Adware.DelphinMediaVieweris a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.DFC Adware.DFC is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.EasyPoint Adware.EasyPoint is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.F1Organizer Adware.F1Organizer is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.FlyCodec Adware.FlyCodec is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Gator Adware.Gator is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Ihbo Adware.Ihbo is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.iThink Adware.iThink is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Need2Find Adware.Need2Find is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.NetAdware Adware.NetAdware is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.PlayMP3Z Adware.PlayMP3Z is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Quick Adware.Quick is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.SEMTool Adware.SEMTool is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.Tencent Win23.Adware.Tencent is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.TradeExit Adware.TradeExit is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Adware.UrlSpy Adware.UrlSpy is a potentially unwanted program that displays advertisements and may send information about the user back to its server.
Music Of Faith Toolbar Music Of Faith Toolbar may force to install itself as a BHO. It is missing both a EULA and Privacy Policy. It automatically installs on all user accounts.
zzToolbar zzToolbar may force to install itself as a BHO. It is missing both a EULA and Privacy Policy. It automatically installs on all user accounts.
Toolbar.MySearch MySearchBar is a toolbar. This potentially unwanted application installs without providing sufficient notice and choice to users and does not secure their full, meaningful and informed consent prior to installation. MyWebSearch toolbar is also installed on all user accounts and does not provide a functional uninstaller.
Vomba Vomba displays pop-up and pop-under advertisements based on the user's surfing habits. It is bundled with functionally separate screensavers and background applications.

BACKDOORS
Backdoor.Bo.BeeOne Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Backdoor.Bo.Butttrumpet
Win32.Backdoor.Adverbot
Win32.Backdoor.Advertor
Win32.Backdoor.Aeon
Win32.Backdoor.Afbot
Win32.Backdoor.Aibolit
Win32.Backdoor.Aim
Win32.Backdoor.Aimaster
Win32.Backdoor.AimPass
Win32.Backdoor.Aimrat
Win32.Backdoor.AIMVision
Win32.Backdoor.Akakiy
Win32.Backdoor.Akcom
Win32.Backdoor.Akosch
Win32.Backdoor.Aladino
Win32.Backdoor.Alcobot
Win32.Backdoor.Alcodor
Win32.Backdoor.Alerter
Win32.Backdoor.Alex
Win32.Backdoor.Alfdoor
Win32.Backdoor.Alicia
Win32.Backdoor.Alien
Win32.Backdoor.Allaple
Win32.Backdoor.Almaster
Win32.Backdoor.Alop
Win32.Backdoor.Alpha
Win32.Backdoor.Alvgus
Win32.Backdoor.Amanda
Win32.Backdoor.Ambush
Win32.Backdoor.Ameba
Win32.Backdoor.Andover
Win32.Backdoor.Angelfire
Win32.Backdoor.Ani
Win32.Backdoor.Antes
Win32.Backdoor.AntiDenial
Win32.Backdoor.AntiNuke
Win32.Backdoor.AolPWC
Win32.Backdoor.Apdoor
Win32.Backdoor.Aphexdoor
Win32.Backdoor.Apocalaps
Win32.Backdoor.AppServ
Win32.Backdoor.Aquadoor
Win32.Backdoor.Arape
Win32.Backdoor.Arcanum
Win32.Backdoor.Arctic
Win32.Backdoor.Aresdor
Win32.Backdoor.Argentino
Win32.Backdoor.Armageddon
Win32.Backdoor.Arranca
Win32.Backdoor.Arsd
Win32.Backdoor.Ascreen
Win32.Backdoor.Ashley
Win32.Backdoor.Asniffer
Win32.Backdoor.Atomic
Win32.Backdoor.AudioCat
Win32.Backdoor.Audiodoor
Win32.Backdoor.Audiotroj
Win32.Backdoor.Augudor
Win32.Backdoor.Autocrat
Win32.Backdoor.Autohax
Win32.Backdoor.AutoIt
Win32.Backdoor.AutoSpy
Win32.Backdoor.Avanzado
Win32.Backdoor.Avone
Win32.Backdoor.Avstral
Win32.Backdoor.Ayam
Win32.Backdoor.Babot
Win32.Backdoor.Back
Win32.Backdoor.Backage
Win32.Backdoor.BackCGI
Win32.Backdoor.BackConstructor
Win32.Backdoor.BackEnd
Win32.Backdoor.Backlash
Win32.Backdoor.BackPort
Win32.Backdoor.BackSocket
Win32.Backdoor.Backstabb
Win32.Backdoor.BackStreets
Win32.Backdoor.BadCo
Win32.Backdoor.Badrat
Win32.Backdoor.Banger
Win32.Backdoor.Barbare
Win32.Backdoor.Barbie
Win32.Backdoor.Barisot
Win32.Backdoor.BaronNight
Win32.Backdoor.BasicHell
Win32.Backdoor.BDDT
Win32.Backdoor.BDirect
Win32.Backdoor.BDS.Bot
Win32.Backdoor.Bedienks
Win32.Backdoor.Belang
Win32.Backdoor.Belio
Win32.Backdoor.Benju
Win32.Backdoor.Bestpics
Win32.Backdoor.Bigbot
Win32.Backdoor.Bigorna
Win32.Backdoor.Bilateral
Win32.Backdoor.Billatan
Win32.Backdoor.BillsDeath
Win32.Backdoor.Bingle
Win32.Backdoor.Biomac
Win32.Backdoor.BirdSpy
Win32.Backdoor.BirdWatcher
Win32.Backdoor.Bitar
Win32.Backdoor.Bitbot
Win32.Backdoor.Bitcon
Win32.Backdoor.Bits
Win32.Backdoor.BLA
Win32.Backdoor.BlackAngel
Win32.Backdoor.BlackDiver
Win32.Backdoor.BlackHaraz
Win32.Backdoor.BlackIce
Win32.Backdoor.Blade
Win32.Backdoor.BladeRunner
Win32.Backdoor.Blador
Win32.Backdoor.Blaire
Win32.Backdoor.Blarul
Win32.Backdoor.Blastit
Win32.Backdoor.Blhouse
Win32.Backdoor.BluanWeb
Win32.Backdoor.BlueAdept
Win32.Backdoor.Blueang
Win32.Backdoor.BlueFire
Win32.Backdoor.BlueIce
Win32.Backdoor.Bluntman
Win32.Backdoor.BNLite
Win32.Backdoor.Bo
Win32.Backdoor.Bo.Client.Deep
Win32.Backdoor.BO2k +2
Win32.Backdoor.BodomBot
Win32.Backdoor.Boid
Win32.Backdoor.Boiling
Win32.Backdoor.BoomRaster
Win32.Backdoor.Bossat
Win32.Backdoor.Botanvec
Win32.Backdoor.Botao
Win32.Backdoor.Botcmd
Win32.Backdoor.Botex
Win32.Backdoor.Bot-gen
Win32.Backdoor.Bouffe
Win32.Backdoor.Bowl
Win32.Backdoor.BOXP
Win32.Backdoor.BrainSpy
Win32.Backdoor.BrainWiper
Win32.Backdoor.Breach
Win32.Backdoor.Bregol
Win32.Backdoor.Brickder
Win32.Backdoor.Broadoor
Win32.Backdoor.Broser
Win32.Backdoor.BrownOrifice
Win32.Backdoor.BSDI
Win32.Backdoor.BTNGdoor
Win32.Backdoor.Bubbel
Win32.Backdoor.Buben
Win32.Backdoor.Burbul
Win32.Backdoor.BusConquerer
Win32.Backdoor.Bushtrommel
Win32.Backdoor.Buttman
Win32.Backdoor.Buxtehude
Win32.Backdoor.ByShell
Win32.Backdoor.Cafeini
Win32.Backdoor.Canvas
Win32.Backdoor.Carufax
Win32.Backdoor.Cazdoor
Win32.Backdoor.CBlade
Win32.Backdoor.CCInvader
Win32.Backdoor.Cdudoor
Win32.Backdoor.Celine
Win32.Backdoor.Cero
Win32.Backdoor.CFour
Win32.Backdoor.Charge
Win32.Backdoor.Chat
Win32.Backdoor.Chatspy
Win32.Backdoor.Chcb
Win32.Backdoor.Checkesp
Win32.Backdoor.Cheeser
Win32.Backdoor.Cheng
Win32.Backdoor.ChinDoor
Win32.Backdoor.Chonker
Win32.Backdoor.Chubo
Win32.Backdoor.Chupa
Win32.Backdoor.Cigivip
Win32.Backdoor.Clep
Win32.Backdoor.Click
Win32.Backdoor.Clindestine
Win32.Backdoor.Clop
Win32.Backdoor.Cmdexer
Win32.Backdoor.CMK
Win32.Backdoor.CNK
Win32.Backdoor.Cocoazul
Win32.Backdoor.ColdDeath
Win32.Backdoor.Coldfusion
Win32.Backdoor.Coma
Win32.Backdoor.Comando
Win32.Backdoor.CommInet
Win32.Backdoor.Complod
Win32.Backdoor.Connect4
Win32.Backdoor.Connection
Win32.Backdoor.Contempt
Win32.Backdoor.ControlTotal
Win32.Backdoor.CookieMonster
Win32.Backdoor.Coredoor
Win32.Backdoor.CorruptedLite
Win32.Backdoor.CrackDown
Win32.Backdoor.CrackerDoor
Win32.Backdoor.CrashCool
Win32.Backdoor.Crat
Win32.Backdoor.Cratpro
Win32.Backdoor.CrazyBull
Win32.Backdoor.CrazyNet
Win32.Backdoor.CRS-Gate
Win32.Backdoor.Cruel
Win32.Backdoor.Crunch
Win32.Backdoor.Cucum
Win32.Backdoor.Cyanure
Win32.Backdoor.Cyberat
Win32.Backdoor.CyberJack
Win32.Backdoor.CyberPaky
Win32.Backdoor.CyberSpy
Win32.Backdoor.CyberTake
Win32.Backdoor.Cyn
Win32.Backdoor.DaCryptic
Win32.Backdoor.Dados
Win32.Backdoor.Dagger
Win32.Backdoor.Dancerbot
Win32.Backdoor.Dani
Win32.Backdoor.Daniel
Win32.Backdoor.Danton
Win32.Backdoor.Daodan
Win32.Backdoor.DarkFtp
Win32.Backdoor.DarkIRC
Win32.Backdoor.DarkNova
Win32.Backdoor.DarkPortal
Win32.Backdoor.DarkScan
Win32.Backdoor.DarkSky
Win32.Backdoor.DarkTrojan
Win32.Backdoor.DataRape
Win32.Backdoor.DataSpy
Win32.Backdoor.David
Win32.Backdoor.DcBot
Win32.Backdoor.DCI
Win32.Backdoor.Deadcow
Win32.Backdoor.Deadsock
Win32.Backdoor.DeathBot
Win32.Backdoor.DeathCorner
Win32.Backdoor.DeepThroat
Win32.Backdoor.Deftcode
Win32.Backdoor.Delikon
Win32.Backdoor.DeltaSource
Win32.Backdoor.Demiz
Win32.Backdoor.Derek
Win32.Backdoor.Ders
Win32.Backdoor.DerSpeher
Win32.Backdoor.Destrukor
Win32.Backdoor.Deves
Win32.Backdoor.Devil
Win32.Backdoor.Devildor
Win32.Backdoor.Dewin
Win32.Backdoor.Diablo
Win32.Backdoor.Dialdoor
Win32.Backdoor.Diego
Win32.Backdoor.Diesel
Win32.Backdoor.Digitul
Win32.Backdoor.Dimbus
Win32.Backdoor.Dindang
Win32.Backdoor.Dipti
Win32.Backdoor.DirectConnection
Win32.Backdoor.Dirtxt
Win32.Backdoor.Disconnector
Win32.Backdoor.Divux
Win32.Backdoor.Dizer
Win32.Backdoor.DKangel
Win32.Backdoor.Doadan
Win32.Backdoor.Doly
Win32.Backdoor.DonaldDick
Win32.Backdoor.Dongdor
Win32.Backdoor.Dosh
Win32.Backdoor.DRA
Win32.Backdoor.DragonIrc
Win32.Backdoor.Drat
Win32.Backdoor.DriveTheBus
Win32.Backdoor.DskLite
Win32.Backdoor.DSNX
Win32.Backdoor.EasyClick
Win32.Backdoor.Espion
Win32.Backdoor.Evdesex
Win32.Backdoor.EvilGoat
Win32.Backdoor.Evilsock
Win32.Backdoor.FadeDoor
Win32.Backdoor.FearLess
Win32.Backdoor.Fennarat
Win32.Backdoor.Fenster
Win32.Backdoor.Feri
Win32.Backdoor.FireBird
Win32.Backdoor.Firehacker
Win32.Backdoor.FireHotcker
Win32.Backdoor.Flobo
Win32.Backdoor.Floodnet
Win32.Backdoor.Flux
Win32.Backdoor.Fxdoor
Win32.Backdoor.GateCrasher
Win32.Backdoor.Gift
Win32.Backdoor.GiftTroj
Win32.Backdoor.Ginadoor
Win32.Backdoor.Giza
Win32.Backdoor.GlobalKiller
Win32.Backdoor.GNotiy
Win32.Backdoor.GoAway
Win32.Backdoor.Gobot +60
Win32.Backdoor.GrayBird
Win32.Backdoor.Grisch
Win32.Backdoor.Guptachar
Win32.Backdoor.HackTack
Win32.Backdoor.Hankydor
Win32.Backdoor.Hayrik
Win32.Backdoor.Helibot
Win32.Backdoor.Helios
Win32.Backdoor.Helldriver
Win32.Backdoor.Hornett
Win32.Backdoor.InfecDoor
Win32.Backdoor.Inlook
Win32.Backdoor.Insane
Win32.Backdoor.Instiopen
Win32.Backdoor.Institon
Win32.Backdoor.Inter
Win32.Backdoor.InternalRevise
Win32.Backdoor.Intruder
Win32.Backdoor.Intruse
Win32.Backdoor.Intruzzo
Win32.Backdoor.IRC.Cloner
Win32.Backdoor.IrcContact
Win32.Backdoor.Iroffer
Win32.Backdoor.Iwanywhere
Win32.Backdoor.Izram
Win32.Backdoor.Jacktron
Win32.Backdoor.Jodoor
Win32.Backdoor.JokerDoor +2
Win32.Backdoor.Karakum
Win32.Backdoor.Karin
Win32.Backdoor.Katien
Win32.Backdoor.Kuang
Win32.Backdoor.Labrus
Win32.Backdoor.Litmus
Win32.Backdoor.LiveList
Win32.Backdoor.Livup
Win32.Backdoor.Lohoda
Win32.Backdoor.Luladoor
Win32.Backdoor.Lurker
Win32.Backdoor.Magicon
Win32.Backdoor.MainLine
Win32.Backdoor.Mantis
Win32.Backdoor.MeteorShell
Win32.Backdoor.MindControl
Win32.Backdoor.MiniCommander
Win32.Backdoor.mIRC-based
Win32.Backdoor.Mnets
Win32.Backdoor.Moses
Win32.Backdoor.MotivFTP
Win32.Backdoor.Mozilla
Win32.Backdoor.MServ
Win32.Backdoor.MSNRat
Win32.Backdoor.MSNSpider
Win32.Backdoor.MSNSpyLite
Win32.Backdoor.Mtexer
Win32.Backdoor.Musdie
Win32.Backdoor.Muska
Win32.Backdoor.Mutter
Win32.Backdoor.Nail
Win32.Backdoor.Ncx
Win32.Backdoor.Neodurk
Win32.Backdoor.NerTe
Win32.Backdoor.Netdemon
Win32.Backdoor.NetSpy
Win32.Backdoor.Nettaxi
Win32.Backdoor.NetTrash
Win32.Backdoor.NewFuture
Win32.Backdoor.NTRootkit
Win32.Backdoor.Oblivion +3
Win32.Backdoor.Oderoor
Win32.Backdoor.Olinger
Win32.Backdoor.Pestdoor
Win32.Backdoor.Phantom
Win32.Backdoor.Phase
Win32.Backdoor.Phoenix
Win32.Backdoor.Ping
Win32.Backdoor.Pingdoor
Win32.Backdoor.Pinkle
Win32.Backdoor.Pitfall
Win32.Backdoor.Pizza
Win32.Backdoor.Platen
Win32.Backdoor.Plimus
Win32.Backdoor.Podnok
Win32.Backdoor.Polka
Win32.Backdoor.Prorat
Win32.Backdoor.Protux
Win32.Backdoor.Psychward
Win32.Backdoor.Psyf
Win32.Backdoor.PsyRat +2
Win32.Backdoor.RA
Win32.Backdoor.Ramzdor
Win32.Backdoor.rat
Win32.Backdoor.Reload
Win32.Backdoor.Remhack
Win32.Backdoor.Remod
Win32.Backdoor.ReverseAccess
Win32.Backdoor.Rewindor
Win32.Backdoor.Robobot
Win32.Backdoor.RShot
Win32.Backdoor.Ruledor
Win32.Backdoor.Ruler
Win32.Backdoor.RUX
Win32.Backdoor.Rws
Win32.Backdoor.Rysoft
Win32.Backdoor.Satan
Win32.Backdoor.Senna
Win32.Backdoor.Sheldor
Win32.Backdoor.Shipper
Win32.Backdoor.Shutall
Win32.Backdoor.SmallHTTP-based
Win32.Backdoor.Sneaker
Win32.Backdoor.Snid
Win32.Backdoor.SniperNet
Win32.Backdoor.Snowdoor
Win32.Backdoor.Sobet
Win32.Backdoor.Softwar
Win32.Backdoor.Spartadoor
Win32.Backdoor.SpySender
Win32.Backdoor.Stang
Win32.Backdoor.Starcross
Win32.Backdoor.Stark
Win32.Backdoor.TDS.SE
Win32.Backdoor.Telserv
Win32.Backdoor.Tendoolf
Win32.Backdoor.Test
Win32.Backdoor.Tetick
Win32.Backdoor.TheRipper
Win32.Backdoor.Thunk
Win32.Backdoor.Tofsee
Win32.Backdoor.TTY
Win32.Backdoor.UandMe
Win32.Backdoor.Udps
Win32.Backdoor.Ulrbot
Win32.Backdoor.UltimateRAT
Win32.Backdoor.URCS
Win32.Backdoor.Way
Win32.Backdoor.VBbot
Win32.Backdoor.Wincrash
Win32.Backdoor.Windowsmite
Win32.Backdoor.Wingate-based
Win32.Backdoor.Winker
Win32.Backdoor.Winrat
Win32.Backdoor.Winspy
Win32.Backdoor.VirtualAve
Win32.Backdoor.Wisell
Win32.Backdoor.WRT
Win32.Backdoor.XRat
Win32.Backdoor.Xtcp
Win32.Backdoor.Xtra
Win32.Backdoor.Y3KRat
Win32.Backdoor.Zombodoor
Win32.Backdoor.ZyBot
Win32.Backdoor.Bdurl

DIALERS
Win32.Dialer.GBDialer Dialers are programs that utilize a computer's modem to make calls or access services. Users may want to remove dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or causing access to unintended and unwanted content.
Win32.Dialer.InstantAccess
Win32.Dialer.Platte

DOWNLOADERS
Win32.TrojanDownloader.Aboma Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.AccessMedia
Win32.TrojanDownloader.AcidReign
Win32.TrojanDownloader.Adroar
Win32.TrojanDownloader.Aicore
Win32.TrojanDownloader.Anskya
Win32.TrojanDownloader.AntiVirPro
Win32.TrojanDownloader.Autoit
Win32.TrojanDownloader.Cmjdown
Win32.TrojanDownloader.Cntr
Win32.TrojanDownloader.Druser
Win32.TrojanDownloader.FraudTool
Win32.TrojanDownloader.Hart
Win32.TrojanDownloader.Homles
Win32.TrojanDownloader.JJSB
Win32.TrojanDownloader.Keenval
Win32.TrojanDownloader.Laugma
Win32.TrojanDownloader.Logsnif
Win32.TrojanDownloader.Monurl
Win32.TrojanDownloader.Peregar
Win32.TrojanDownloader.Peregar +9
Win32.TrojanDownloader.Psyme
Win32.TrojanDownloader.Pusrac
Win32.TrojanDownloader.Remor
Win32.TrojanDownloader.RVP
Win32.TrojanDownloader.Salite
Win32.TrojanDownloader.Satray +2
Win32.TrojanDownloader.Searcher
Win32.TrojanDownloader.SearchSpy
Win32.TrojanDownloader.Troll
Win32.TrojanDownloader.Vivia
Win32.TrojanDownloder.Seimon

FLOODERS
Win32.EmailFlooder.AnonEBomber Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive. This is similar to a DDoS attack, where a massive amount of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.
Win32.EmailFlooder.Anonim
Win32.EmailFlooder.AnonyMail
Win32.EmailFlooder.AnonymousMail
Win32.EmailFlooder.Anubis
Win32.EmailFlooder.Aslike
Win32.EmailFlooder.BBMail
Win32.EmailFlooder.Bomzer
Win32.EmailFlooder.CrazyPostman
Win32.EmailFlooder.DaMailer
Win32.EmailFlooder.Delf
Win32.EmailFlooder.DMail
Win32.EmailFlooder.Dmb
Win32.EmailFlooder.Drone
Win32.EmailFlooder.EBomb
Win32.EmailFlooder.EmailBomb
Win32.EmailFlooder.Embozator
Win32.EmailFlooder.Enclave
Win32.EmailFlooder.FMail
Win32.EmailFlooder.FormMail
Win32.EmailFlooder.GhostMail
Win32.EmailFlooder.Hirs
Win32.EmailFlooder.Hottmails
Win32.EmailFlooder.Hropac
Win32.EmailFlooder.Hunter
Win32.EmailFlooder.IPMail
Win32.EmailFlooder.Kidcrash
Win32.EmailFlooder.Kubik
Win32.EmailFlooder.Liame
Win32.EmailFlooder.Listonosz
Win32.EmailFlooder.MailBomber
Win32.EmailFlooder.MailSender
Win32.EmailFlooder.NoName
Win32.EmailFlooder.Norin
Win32.EmailFlooder.Paramail
Win32.EmailFlooder.Phasma
Win32.EmailFlooder.Pocztylion
Win32.EmailFlooder.Sabotage
Win32.EmailFlooder.Saddamme
Win32.EmailFlooder.Shadow
Win32.EmailFlooder.ShockMailer
Win32.EmailFlooder.ShockMarks
Win32.EmailFlooder.Warfair
Win32.EmailFlooder.VB
Win32.EmailFlooder.XMas
Win32.EmailFlooder.ZombBomber
Win32.Flooder.Blitznuker
Win32.Flooder.Buwah
Win32.Flooder.Defeg
Win32.Flooder.Delf
Win32.Flooder.Euthanasia
Win32.Flooder.Excess
Win32.Flooder.Fast
Win32.Flooder.FloodBots
Win32.Flooder.Fono
Win32.Flooder.Fukks
Win32.Flooder.Gewse
Win32.Flooder.GichtyChatFlood
Win32.Flooder.KingBomber
Win32.Flooder.Loower
Win32.Flooder.MarcelBomb
Win32.Flooder.MobileBomb
Win32.Flooder.PacketStorm
Win32.Flooder.Pestil
Win32.Flooder.Phuckpow
Win32.Flooder.Piaoyes
Win32.Flooder.Pjam
Win32.Flooder.Polchat
Win32.Flooder.Quake
Win32.Flooder.RCeight
Win32.Flooder.Scyth
Win32.Flooder.Sevenc
Win32.Flooder.ShellPinger
Win32.Flooder.Shockw
Win32.Flooder.Sin
Win32.Flooder.Spam
Win32.Flooder.TeleBomb
Win32.Flooder.Tfd
Win32.Flooder.UDP
Win32.Flooder.UMod
Win32.Flooder.Uy
Win32.Flooder.Warping
Win32.Flooder.VB
Win32.IMFlooder.AuthFlood
Win32.IMFlooder.Bomber
Win32.IMFlooder.Boom
Win32.IMFlooder.Delf
Win32.IMFlooder.DFMA
Win32.IMFlooder.Energy
Win32.IMFlooder.Fldicq
Win32.IMFlooder.Fpack
Win32.IMFlooder.ICQBomber
Win32.IMFlooder.PagerBomber
Win32.IMFlooder.Punter
Win32.IMFlooder.Svint
Win32.IMFlooder.Toolz
Win32.IMFlooder.ToolzY2K
Win32.IMFlooder.VB
Win32.SMSFlooder.Algus
Win32.SMSFlooder.Attacker
Win32.SMSFlooder.Bomber
Win32.SMSFlooder.BombTheHandy
Win32.SMSFlooder.Bomp
Win32.SMSFlooder.Bone
Win32.SMSFlooder.Dispatcher
Win32.SMSFlooder.HellBomber
Win32.SMSFlooder.IcqSms
Win32.SMSFlooder.Ideknet
Win32.SMSFlooder.Norinc
Win32.SMSFlooder.Samurai
Win32.SMSFlooder.Sharft
Win32.SMSFlooder.Vorwahl
Win32.IRCFlooder.Advertiser
Win32.IRCFlooder.Klone

MONITORS
Win32.Monitor.FTPkeylogger Monitors are surveillance tools that, for example, monitor a user's keystrokes, and therefore may compromise a user's privacy if used in a malicious manner.
Win32.Monitor.GhostKeyLogger
Win32.Monitor.Hooker
Win32.Monitor.ICQSpy
Win32.Monitor.InvisiKeylog
Win32.Monitor.KeyboardGuardian
Win32.Monitor.KeyBoardLogger
Win32.Monitor.KeyLoggerPro
Win32.Monitor.KeyloggerSpy
Win32.Monitor.KeyLogPro
Win32.Monitor.Keymon
Win32.Monitor.MonitorSniffer
Win32.Monitor.MSNSpy
Win32.Monitor.PowerLogger
Win32.Monitor.PowerSpy
Win32.Monitor.SmartKeyStrokeRec
Win32.Monitor.SpyArsenal
Win32.Monitor.SpyBuddy
Win32.Monitor.SpyKeylogger
Win32.Monitor.SpyPal
Win32.Monitor.Spytector
Win32.Monitor.WebMailSpy
Win32.Monitor.WinSpy
Win32.Monitor.Wiretap
Personal PC Spy
Privacy-Watcher

NUKERS
Win32.Nuker.Kaput Nukers are used to harm other computers over the Internet, making them crash or reboot.
Win32.Nuker.Killme
Win32.Nuker.Knewk
Win32.Nuker.Lockup
Win32.Nuker.Lornuke
Win32.Nuker.Mime
Win32.Nuker.Muerte
Win32.Nuker.Multilate
Win32.Nuker.Netsend
Win32.Nuker.Newker
Win32.Nuker.Nonuker
Win32.Nuker.NSNuke
Win32.Nuker.NTHunter
Win32.Nuker.Nucku
Win32.Nuker.NuKe
Win32.Nuker.NukeIt +2
Win32.Nuker.NukeMSN
Win32.Nuker.Pepsid
Win32.Nuker.Pixel
Win32.Nuker.Pnewq
Win32.Nuker.Pnuke
Win32.Nuker.Portfu
Win32.Nuker.RPCnuke
Win32.Nuker.Small
Win32.Nuker.SmbDie
Win32.Nuker.Spacoom
Win32.Nuker.SQLnuke
Win32.Nuker.Vai
Win32.Nuker.Walwas
Win32.Nuker.WinNuke
Win32.Nuker.Voob

PASSWORD STEALERS
Win32.TrojanPWS.Akcom.ref Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.TrojanPWS.AOLpass
Win32.TrojanPWS.Cimga
Win32.Trojan-PWS.Furitron
Win32.Trojan-PWS.Gamec
Win32.Trojan-PWS.Ganhame
Win32.Trojan-PWS.GES
Win32.TrojanPWS.Hooker
Win32.Trojan-PWS.IcqSmiley
Win32.TrojanPWS.Jiakong
Win32.Trojan-PWS.Kapod
Win32.Trojan-PWS.Logmod
Win32.TrojanPWS.M2
Win32.Trojan-PWS.Mapler
Win32.Trojan-PWS.Meteor
Win32.Trojan-PWS.Mewey
Win32.Trojan-PWS.Mirbaby
Win32.Trojan-PWS.Moiuo
Win32.Trojan-PWS.NetMail
Win32.TrojanPWS.Papras
Win32.TrojanPWS.Pasorot
Win32.Trojan-PWS.Phreaker
Win32.Trojan-PWS.Platan
Win32.Trojan-PWS.Prefix
Win32.TrojanPWS.QQDragon
Win32.Trojan-PWS.QQttff
Win32.Trojan-PWS.RavenPass
Win32.TrojanPWS.Redzone +2
Win32.TrojanPWS.Retriver
Win32.TrojanPWS.Robofo
Win32.Trojan-PWS.Sagic
Win32.Trojan-PWS.Senha
Win32.Trojan-PWS.SiteBreaker
Win32.Trojan-PWS.SpeedUp
Win32.Trojan-PWS.Spion
Win32.Trojan-PWS.Stealer
Win32.TrojanPWS.Sunfo
Win32.TrojanPWS.Trillian
Win32.PWS.Yahoo.YPager
Win32.Trojan-PWS.ZombSmall
Win32.Trojan-PWS.Zytric

ROGUE ANTI-SPYWARE APPLICATIONS Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
AntiVirus 2008 AntiVirus 2008 is a rogue anti-spyware application; it may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
AntiVirProtect  AntiVirProtect is a rogue anti-spyware and clone of BraveSentry; it may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
CodeClean  CodeClean is rogue anti-spyware that tricks the user into buying the commercial version. CodeClean's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes. It is of Korean origin.
DrPCClean DrPCClean is rogue anti-spyware that tricks the user into buying the commercial version. DrPCClean's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.
Malware Bell Malware Bell is a rogue anti-spyware application. It may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
MyPcDoctor MyPcDoctor is rogue anti-spyware that tricks the user into buying the commercial version. MyPcDoctor's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.
RegistryGreat RegistryCleaner is a rogue application; it may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
AntiMalwareGuard AntiMalwareGuard is rogue anti-errorware that tricks the user into buying the commercial version. AntiMalwareGuard's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.
AntispywareDeluxe AntispywareDeluxe is a rogue anti-spyware application. It may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
AntiSpywareExpert AntiSpywareExpert is a rogue anti-spyware application. It may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
WinSpywareProtect WinSpywareProtect is a rogue anti-spyware application. It may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
VirusIsolator VirusIsolator is a rogue anti-spyware application. It may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
XPShield XPShield is rogue anti-spyware that tricks the user into buying the commercial version. XPShield's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.
SpywareDestructor SpywareDestructor is a rogue anti-spyware application. It may give exaggerated threat reports on the compromised computer, then ask the user to purchase a registered version to remove those reported threats.
SpyGuarder SpyGuarder is rogue anti-spyware that tricks the user into buying the commercial version. SpyGuarder's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.
IEAntiVirus IEAntiVirus is a rogue anti-spyware application and a clone of IEDefender. It tricks the user by detecting malicous files (downloaded from Win32.TrojanDownloader.IEDefender), then asks the user to purchase a registered version to remove the reported threats which it created.
InfeStopRemover InfeStopRemover is rogue anti-spyware that tricks the user into buying the commercial version. InfeStopRemover's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.
EasySpywareCleaner EasySpywareCleaner is rogue anti-spyware that tricks the user into buying the commercial version. EasySpywareCleaner's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.

TROJANS
Win32.Trojan.CleanBK Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.CmosKiller
Win32.Trojan.Coldlimit
Win32.Trojan.Crash
Win32.Trojan.CrashSystem
Win32.Trojan.DeathPack
Win32.Trojan.Deki
Win32.Trojan.DeltaHacking
Win32.Trojan.Delwin
Win32.Trojan.Densil
Win32.Trojan.DesktopPuzzle
Win32.Trojan.Dialscript
Win32.Trojan.Dire
Win32.Trojan.Disabler
Win32.Trojan.DiskFlood
Win32.Trojan.Duramp
Win32.Trojan.Edead
Win32.Trojan.Efno
Win32.Trojan.Exploder
Win32.Trojan.Filco
Win32.Trojan.Flechal
Win32.Trojan.FormatCQ
Win32.Trojan.Frogexer
Win32.Trojan.Fruitcake
Win32.Trojan.Fuhd
Win32.Trojan.Gaslide
Win32.Trojan.Gendal
Win32.Trojan.Gentee
Win32.Trojan.GHook
Win32.Trojan.GLB
Win32.Trojan.Glitch
Win32.Trojan.HDFill +2
Win32.Trojan.Hider
Win32.Trojan.Hipa
Win32.Trojan.iBill
Win32.Trojan.IFramer
Win32.Trojan.IM
Win32.Trojan.Insteax
Win32.Trojan.Inteter
Win32.Trojan.Keypanic
Win32.Trojan.Khaos
Win32.Trojan.Kirek
Win32.Trojan.Loader
Win32.Trojan.Mailbot
Win32.Trojan.Malagent
Win32.Trojan.MBRoot
Win32.Trojan.Milt
Win32.Trojan.Monder
Win32.Trojan.MSWord
Win32.Trojan.NetBuster
Win32.Trojan.Noupdate
Win32.Trojan.Nukulus
Win32.Trojan.Opakiller
Win32.Trojan.OpCenter
Win32.Trojan.OptixKill
Win32.Trojan.P2E
Win32.Trojan.Packed
Win32.Trojan.Peerad
Win32.Trojan.Peflog
Win32.Trojan.Podnuha
Win32.Trojan.PopUpper
Win32.Trojan.PrcView
Win32.Trojan.Psyme
Win32.Trojan.Radi
Win32.Trojan.RAMeater
Win32.Trojan.Rasaper
Win32.Trojan.RASFlooder
Win32.Trojan.Rebooter
Win32.Trojan.Redblood
Win32.Trojan.Regger
Win32.Trojan.Regrun
Win32.Trojan.RKFaja
Win32.Trojan.Sakas
Win32.Trojan.Samsa
Win32.Trojan.Sehole
Win32.Trojan.SendMail
Win32.Trojan.ShakeIt
Win32.Trojan.Silentbanker
Win32.Trojan.Slefdel
Win32.Trojan.Smell
Win32.Trojan.Soul
Win32.Trojan.Spabot
Win32.Trojan.Spamer
Win32.Trojan.Spitfier
Win32.Trojan.Spruce
Win32.Trojan.Sumo
Win32.Trojan.TalkStock
Win32.Trojan.Tclock
Win32.Trojan.Tipiki
Win32.Trojan.Vapsup
Win32.Trojan.WGetmo
Win32.Trojan.VirtualRoot
Win32.Trojan.Xalnaga
Win32.Trojan.Zatoptysh
Win32.Trojan.Zlo

TROJAN.CLICKERS
Win32.TrojanClicker.Adpower Trojan.Clickers may cause the victim's machine to contact a target webpage without the user's knowledge or consent to falsify data about the number of times the webpage is visited.
Win32.TrojanClicker.Blobus
Win32.TrojanClicker.Densmail
Win32.TrojanClicker.Dnclick
Win32.TrojanClicker.Galepo
Win32.TrojanClicker.Glocker
Win32.TrojanClicker.NetBuie
Win32.TrojanClicker.Pamere
Win32.TrojanClicker.Small

TROJAN DDOS APPLICATIONS
Win32.TrojanDDoS.Crabox TrojanDDoS applications provide functionality that make it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.DepthCharge
Win32.TrojanDDoS.FloodNet
Win32.TrojanDDoS.Maker
Win32.TrojanDDoS.Smurff
Win32.TrojanDDoS.StormAttack
Win32.DoS.Agent
Win32.DoS.Angeldos
Win32.DoS.Aphexos
Win32.DoS.Imiko
Win32.DoS.Mepf
Win32.DoS.Misoska
Win32.DoS.Nuchit
Win32.DoS.Panther
Win32.DoS.Vaite
Win32.DoS.Wako
Win32.DoS.Vonvod
Win32.DoS.XScript

TROJAN.DROPPERS
Win32.TrojanDropper.Banke Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders.
Win32.Trojan-Dropper.BatCloner
Win32.Trojan-Dropper.BeJoin
Win32.Trojan-Dropper.BigJack
Win32.TrojanDropper.Calmocho
Win32.TrojanDropper.Cattivo
Win32.TrojanDropper.Datex
Win32.Trojan-Dropper.Djoiner
Win32.Trojan-Dropper.ExeBundle
Win32.Trojan-Dropper.exeStealther
Win32.TrojanDropper.FakeAV
Win32.TrojanDropper.Fantu
Win32.TrojanDropper.Flystud
Win32.Trojan-Dropper.FreshBind
Win32.TrojanDropper.HotWebBar
Win32.TrojanDropper.Inject
Win32.TrojanDropper.KGen
Win32.TrojanDropper.Kuang
Win32.Trojan-Dropper.Mincer
Win32.TrojanDropper.MultiJoiner
Win32.TrojanDropper.Prodex
Win32.Trojan-Dropper.QuickBatC
Win32.TrojanDropper.QuickBatch
Win32.Trojan-Dropper.RDM
Win32.Trojan-Dropper.Silkrope
Win32.Trojan-Dropper.Tefil
Win32.Trojan-Dropper.Xbinder

TROJAN.NOTIFIERS
Win32.TrojanNotifier.KBLup Trojan.Notifiers are Trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing system vulnerability. Trojan.Notifiers may thereby compromise system security and user privacy.
Win32.TrojanNotifier.VB
Win32.TrojanNotifier.Hippy

TROJAN.PROXIES
Win32.TrojanProxy.Fackemo Trojan.Proxies may open up the infected machine to be used as a proxy server.
Win32.TrojanProxy.SafeMail
Win32.TrojanProxy.Sobit

TROJAN.SPIES
Win32.TrojanSpy.Flecsip Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.
Win32.TrojanSpy.Flux
Win32.TrojanSpy.GhostSpy
Win32.TrojanSpy.Gologger
Win32.TrojanSpy.Haxspy
Win32.TrojanSpy.Idly
Win32.TrojanSpy.Kcap
Win32.TrojanSpy.KeySave
Win32.TrojanSpy.Montp
Win32.TrojanSpy.MSNKeylog
Win32.TrojanSpy.Pachat
Win32.TrojanSpy.PcGhost
Win32.TrojanSpy.Pclog
Win32.TrojanSpy.Pino
Win32.TrojanSpy.QQSpy
Win32.TrojanSpy.Qukart
Win32.TrojanSpy.Sincom
Win32.TrojanSpy.Sisie
Win32.TrojanSpy.Starax
Win32.TrojanSpy.Tofger
Win32.TrojanSpy.WebPageRecorder
Win32.TrojanSpy.ZZSoft

VIRUSES
Win32.Virus.Alcaul Viruses are code that recursively replicate a possibly evolved copy of themselves. Viruses infect a Host File or system area, or they simply modify a reference to such objects to take control and then multiply again to form new generations.
Win32.Virus.Sality

WORMS
Win32.Worm.Abotus Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.Worm.Actem
Win32.Worm.Agist
Win32.Worm.Aliz
Win32.Worm.AllocUp
Win32.Worm.Alphx
Win32.Worm.Anar
Win32.Worm.Android
Win32.Worm.Anilogo
Win32.Worm.Antiax
Win32.Worm.Apost
Win32.Worm.AutoIt
Win32.Worm.Avoner
Win32.Worm.Avron
Win32.Worm.Azaco
Win32.Worm.Azag
Win32.Worm.Badas
Win32.Worm.Bater
Win32.Worm.Bindal
Win32.Worm.Borzella
Win32.Worm.Bumdoc
Win32.Worm.Bumerang
Win32.Worm.Busan
Win32.Worm.Celebit
Win32.Worm.Chet
Win32.Worm.Choke
Win32.Worm.Ciosor
Win32.Worm.CodBot
Win32.Worm.Colevo
Win32.Worm.Combra +2
Win32.Worm.Cone
Win32.Worm.Conut
Win32.Worm.Cosol
Win32.Worm.Creepy
Win32.Worm.Cydog
Win32.Worm.Dabber
Win32.Worm.Dasher
Win32.Worm.DeadHeat
Win32.Worm.Deberia
Win32.Worm.Desos
Win32.Worm.Dilber
Win32.Worm.DmSetup
Win32.Worm.Donghe
Win32.Worm.Doomran
Win32.Worm.Energy
Win32.Worm.Entangle
Win32.Worm.Enviar
Win32.Worm.Evan
Win32.Worm.Fagled
Win32.Worm.Fakenap
Win32.Worm.Fanbot
Win32.Worm.Fanker
Win32.Worm.Fearso
Win32.Worm.Finaldo
Win32.Worm.Fintas
Win32.Worm.Fix2001
Win32.Worm.Fog +3
Win32.Worm.FreeTrip
Win32.Worm.Frethem
Win32.Worm.Gain
Win32.Worm.Gift
Win32.Worm.Gizer
Win32.Worm.GOPworm
Win32.Worm.Goround
Win32.Worm.Gotit
Win32.Worm.Gruel
Win32.Worm.Heads
Win32.Worm.Headtail
Win32.Worm.Heffer
Win32.Worm.Hunch +2
Win32.Worm.Ice
Win32.Worm.Icecubes
Win32.Worm.InfoJack
Win32.Worm.Ivalid
Win32.Worm.Jubon
Win32.Worm.Kadra
Win32.Worm.Kazus
Win32.Worm.Kelino
Win32.Worm.Kindal +2
Win32.Worm.Klexe
Win32.Worm.Lacrow
Win32.Worm.Lafon
Win32.Worm.Lamado
Win32.Worm.Langex
Win32.Worm.Lassorm
Win32.Worm.Leebad
Win32.Worm.Ligon
Win32.Worm.Lindodia
Win32.Worm.Litar
Win32.Worm.Logex
Win32.Worm.Lohack
Win32.Worm.LoveLetter
Win32.Worm.LunarStorm
Win32.Worm.Mabezat
Win32.Worm.Manyx
Win32.Worm.Mari
Win32.Worm.Matcher
Win32.Worm.Mefir
Win32.Worm.Melting
Win32.Worm.Menace
Win32.Worm.Miniman
Win32.Worm.Morbex
Win32.Worm.MTX
Win32.Worm.Muma
Win32.Worm.Nahata
Win32.Worm.Naked
Win32.Worm.Nautical
Win32.Worm.Naxe
Win32.Worm.Neight
Win32.Worm.Netav
Win32.Worm.Neton
Win32.Worm.NetSup
Win32.Worm.Newapt
Win32.Worm.Nihilit
Win32.Worm.Niqim
Win32.Worm.Nocana
Win32.Worm.Nodoom
Win32.Worm.Nohoper
Win32.Worm.Nyxem
Win32.Worm.Opanki
Win32.Worm.Otwycal
Win32.Worm.Padobot
Win32.Worm.Paroc
Win32.Worm.Parrot
Win32.Worm.PeerBot
Win32.Worm.Pepex
Win32.Worm.Pereban
Win32.Worm.Plage
Win32.Worm.Plemood
Win32.Worm.Polip
Win32.Worm.Predec
Win32.Worm.PrettyPark
Win32.Worm.Puron
Win32.Worm.QQPass
Win32.Worm.Quamo
Win32.Worm.Radix
Win32.Worm.Rayman
Win32.Worm.Rokut
Win32.Worm.Roron
Win32.Worm.Rous
Win32.Worm.Runfer
Win32.Worm.RxBot
Win32.Worm.Saros
Win32.Worm.Savage
Win32.Worm.Scorpion
Win32.Worm.Sharpei
Win32.Worm.Shatrix
Win32.Worm.Shuq
Win32.Worm.Sidex
Win32.Worm.Siney
Win32.Worm.Sinmsn
Win32.Worm.Skudex
Win32.Worm.Skybag
Win32.Worm.Sowsat
Win32.Worm.Stator
Win32.Worm.Stepaik
Win32.Worm.Symten
Win32.Worm.SysClock
Win32.Worm.Tanatos
Win32.Worm.Taripox
Win32.Worm.Tibick +18
Win32.Worm.Tossed
Win32.Worm.Totilix
Win32.Worm.Trilissa
Win32.Worm.Updater
Win32.Worm.Urick
Win32.Worm.Wabbin
Win32.Worm.Waber
Win32.Worm.Vampa
Win32.Worm.Wast
Win32.Worm.Welchia
Win32.Worm.Welyah
Win32.Worm.Vesser +3
Win32.Worm.White
Win32.Worm.Visilin
Win32.Worm.Wlymak
Win32.Worm.Vorgon
Win32.Worm.Vote
Win32.Worm.Wozer
Win32.Worm.Yever
Win32.Worm.Youdgos
Win32.Worm.Zircon
Win32.Worm.Zokrim
Win32.IRCWorm.Lucky
Win32.IRCWorm.Netol
Win32.IRCWorm.TheSpy
Win32.P2PWorm.Blaxe
Win32.P2PWorm.Kapucen
Win32.P2PWorm.Krepper
Win32.P2PWorm.Malas
Win32.P2PWorm.SdDrop +21
Win32.P2PWorm.Silly
Win32.P2PWorm.Sytro
Win32.P2PWorm.Tanked +81
Win32.P2PWorm.VB
IRCWorm.Generic

TAI - Threat Analysis Index
The Lavasoft Threat Analysis Index (TAI) system is based on a 10-point scale, with 1 representing the lowest threat and 10 representing the highest. The behavior of the program has more influence when assigning TAI points than the actual technical aspects of the malware. In other words, if the malware secretly attaches without the computer user's full understanding and approval, then it will automatically be given higher TAI points. A minimum TAI value of 3 is required before the malware is put into detection. Read more on the Lavasoft Security Center here.

Threat Analysis (TA) Index

 
  Home
New! Ad-Aware 2008 Plus and Pro

78Percentage of computer users who lack core protection to keep their computers, information and families safe from cyber criminals.
Source: National Cyber Security Alliance

The phrase blended threats is often used to describe today’s online threat landscape; cyber criminals increasingly use combinations of malware (worms, Trojans, rootkits, viruses), along with multiple attack routes, to get past users’ defenses.

We’ve received a few common queries from our LN readers on the new, extended virus protection in Ad-Aware 2008 Plus and Pro. Here are your questions answered.

“Long considered the grandfather of antispyware programs, Ad-Aware keeps getting better.”
CNET

Lavasoft AB Lilla Bommen 1, 411 04 Gothenburg, Sweden | www.lavasoft.com | editor@lavasoft.com

Learn More