Lavasoft Malware Labs recently had a closer look on an IP range full of hoax sites. Reverse IP on 78.129.142.235 will reveal around 200 fraudulent domains which are hosted in United Arab Emirates.  Most of the sites hosted under 78.129.142.235 will use and take advantage of already existing products from the security industry and other popular software. The examples below display their way to make illegal domains look reliable.

hxxp://7zip-2009.info
hxxp://Directx-full.info
hxxp://Icq-full.info
hxxp://Messengerplus-2009.info
hxxp://Safari-full.info
hxxp://Winrar-2009.com
hxxp://Www-kaspersky.info


Today a new rogue was discovered called Spyware Fighter.  It is following the normal patterns with false detections and trying to scare the user into buying a license to clean them.

 

Further it has the classic user friendly home page available under a few similar named domains.

 

SpywareFighter was added to detection in release 0146.0017.


0146.0017 is now available, new definition file for Ad-Aware Anniversary Edition.

New definitions:
====================
PrivacyComponents
SpywareFighter

Updated definitions:
====================
InternetAntivirusPro
XLG Security Center

MD5 checksum for core.aawdef is 3affd2aa71307b1bfe8d620271355bbd


0146.0016 is now available, new definition file for Ad-Aware Anniversary Edition.

New definitions:
====================
Adware.Advision
Win32.Flooder.ArpPack
Win32.Flooder.Bomber
Win32.Flooder.ICQ
Win32.Flooder.Misoka
Win32.Flooder.MPCLagger
Win32.Flooder.Teamspeak
Win32.Monitor.EZRecKb
Win32.Monitor.IMonitorPC
Win32.Monitor.PCPolice

Updated definitions:
====================
404search
ABetterInternet.Aurora
AdRotator
Adware.AdAgent


0146.0015 is now available, new definition file for Ad-Aware Anniversary Edition.


0146.0014 is now available, new definition file for Ad-Aware Anniversary Edition.


0146.0013 is now available, new definition file for Ad-Aware Anniversary Edition.

Removed false detections.


0146.0012 is now available, new definition file for Ad-Aware Anniversary Edition.


2 New rogue Anti-Virus software

by LS Anders on February 16th, 2009 in Rogues.

Some new rogue anti-virus programs to be aware of...First out is XPVirusProtection with a standard looking website.

Homepage


0146.0011 is now available, new definition file for Ad-Aware Anniversary Edition.

New definitions:
====================
MalwareDoc
TotalVirusProtection
Win32.Backdoor.Julio
Win32.Backdoor.Teldoor
Win32.Backdoor.Trippi
Win32.Trojan.Olmarik
Win32.Trojan.Renaz
Win32.Trojan.Warrock
Win32.Trojan.Vhorse
Win32.Trojan.Yaccount
Win32.TrojanPWS.Crtz
Win32.TrojanPWS.LdPlog
Win32.TrojanPWS.Logon
Win32.TrojanPWS.Mailview
Win32.TrojanPWS.Yahoospy
Win32.Worm.Angel
Win32.Worm.Entrophy
Win32.Worm.McMaggot
Win32.Worm.Nikmat
XPVirusProtection

Updated definitions:
====================
Adware.BHO(generic)
Adware.GooochBiz
Adware.Hengbang
Adware.MDH
Adware.Mirar
Adware.NaviPromo
Adware.Relevant
Adware.Stud
Adware.SuperJuan
Adware.TrafficSol
Adware.WSearch
Adware.ZenoSearch
Adware.Zhongsou
Antivirus2009
Antivirus360
Ardamax Keylogger
BlazingTools Perfect Keylogger
FakeAlert
IE-Security
Lop
MSAntispyware2009
Perflogger
PurityScan
SCKeyLog Trojan
SpyProtector
SpywareGuard2009
SystemGuard2009
Toolbar.Softo
WebHancer
Win32.AdWare.Cinmus
Win32.Adware.Rabio
Win32.Backdoor.Agent
Win32.Backdoor.Agobot
Win32.Backdoor.AimBot
Win32.Backdoor.Backdoor
Win32.Backdoor.Bandok
Win32.Backdoor.Bifrose
Win32.Backdoor.Bot
Win32.Backdoor.Brabot
Win32.Backdoor.Cakl
Win32.Backdoor.CiaDoor
Win32.Backdoor.Delf
Win32.Backdoor.Deplotoz
Win32.Backdoor.DragonBot
Win32.Backdoor.DsBot
Win32.Backdoor.DSNX
Win32.Backdoor.EggDrop
Win32.Backdoor.EvilBot
Win32.Backdoor.Flyagent
Win32.Backdoor.Frauder
Win32.Backdoor.Gaduka
Win32.Backdoor.GrayBird
Win32.Backdoor.HacDef
Win32.Backdoor.Havar
Win32.Backdoor.Hupigon
Win32.Backdoor.Inject
Win32.Backdoor.IRCBot
Win32.Backdoor.IRCZapchast
Win32.Backdoor.Iroffer
Win32.Backdoor.Joleee
Win32.Backdoor.Kbot
Win32.Backdoor.Kelebek
Win32.Backdoor.KeyStart
Win32.Backdoor.MoSucker
Win32.Backdoor.Nepoe
Win32.Backdoor.Netbus
Win32.Backdoor.Nethief
Win32.Backdoor.Oderoor
Win32.Backdoor.Optix
Win32.Backdoor.Pahador
Win32.Backdoor.PcClient
Win32.Backdoor.Pigeon
Win32.Backdoor.Poison
Win32.Backdoor.PoisonIvy
Win32.Backdoor.Prorat
Win32.Backdoor.Prosti
Win32.Backdoor.Qmop
Win32.Backdoor.RBot
Win32.Backdoor.Reload
Win32.Backdoor.RShot
Win32.Backdoor.Rukap
Win32.Backdoor.Rustock
Win32.Backdoor.Schimit
Win32.Backdoor.SDBot
Win32.Backdoor.Shark
Win32.Backdoor.Singu
Win32.Backdoor.Sinowal
Win32.Backdoor.Small
Win32.Backdoor.SpecTroj
Win32.Backdoor.Spyboter
Win32.Backdoor.SuperMM
Win32.Backdoor.TDSS
Win32.Backdoor.TheRipper
Win32.Backdoor.Ton
Win32.Backdoor.Turkojan
Win32.Backdoor.Valvoline
Win32.Backdoor.VanBot
Win32.Backdoor.VB
Win32.Backdoor.WinUoj
Win32.Backdoor.Virkel
Win32.Backdoor.WootBot
Win32.Backdoor.Xeol
Win32.Backdoor.Zdoogu
Win32.Dialer.Trojan
Win32.EmailFlooder.MailBomber
Win32.Flooder.RoomDestroyer
Win32.Generic.PWS
Win32.Generic.Worm
Win32.Hoax.Renos
Win32.Monitor.SpyAgent
Win32.Monitor.WinSpy
Win32.P2PWorm.Agobot
Win32.P2PWorm.Bacteraloh
Win32.P2PWorm.Kapucen
Win32.P2PWorm.Nugg
Win32.PWS.Yahoo.YPager
Win32.Rootkit.Agent
Win32.Rootkit.Fuzen
Win32.Rootkit.Pakes
Win32.Rootkit.Podnuha
Win32.Rootkit.Protector
Win32.Rootkit.Small
Win32.Rootkit.TDSS
Win32.Rootkit.Tiny
Win32.SMSFlooder.Ideknet
Win32.SpamTool.Blen
Win32.Trojan.AdClicker
Win32.Trojan.Agent
Win32.Trojan.Agent2
Win32.Trojan.AgentMB
Win32.Trojan.Alureon
Win32.Trojan.Atraps
Win32.Trojan.AutoIT
Win32.Trojan.Bepiv
Win32.Trojan.BHO
Win32.Trojan.BkClient
Win32.Trojan.Boaxxe
Win32.Trojan.Buzus
Win32.Trojan.Cdur
Win32.Trojan.Chifrax
Win32.Trojan.ClickMe
Win32.Trojan.Conycspa
Win32.Trojan.Crackpai
Win32.Trojan.Delf
Win32.Trojan.Disabler
win32.Trojan.Dnschanger
Win32.Trojan.Downloader
Win32.Trojan.EliteBar
Win32.Trojan.Emo
Win32.Trojan.Ertfor
Win32.Trojan.ExplorerHijack
Win32.Trojan.FakeAV
Win32.Trojan.FakeMSN
Win32.Trojan.FirewallBypass
Win32.Trojan.Flashkiller
Win32.Trojan.Flood
Win32.Trojan.Fraudpack
Win32.Trojan.FWdisable
Win32.Trojan.Gendal
Win32.Trojan.Genome
Win32.Trojan.Hijacker
Win32.Trojan.Hiloti
Win32.Trojan.Inject
Win32.Trojan.Jevafus
Win32.Trojan.Jhee
Win32.Trojan.Keylogger
Win32.Trojan.KillAV
Win32.Trojan.KillFiles
Win32.Trojan.Krotten
Win32.Trojan.LaSta
Win32.Trojan.Lighty
Win32.Trojan.Loader
Win32.Trojan.Mailfinder
Win32.Trojan.Midgare
Win32.Trojan.MMM
Win32.Trojan.MonaGrey
Win32.Trojan.Monder
Win32.Trojan.Obfuscated
Win32.Trojan.Pakes
Win32.Trojan.Peed
Win32.Trojan.Piptea
Win32.Trojan.PWS.PassViewer
Win32.Trojan.Qhost
Win32.Trojan.Regrun
Win32.Trojan.Runner
Win32.Trojan.Sadenav
Win32.Trojan.Slefdel
Win32.Trojan.Slenfbot
Win32.Trojan.Small
Win32.Trojan.Spambot
Win32.Trojan.Spy
Win32.Trojan.Starter
Win32.Trojan.StartPage
Win32.Trojan.SubSys
Win32.Trojan.TDss
Win32.Trojan.Tiny
Win32.Trojan.Trash
Win32.Trojan.Vaklik
Win32.Trojan.Vapsup
Win32.Trojan.VB
Win32.Trojan.Virtl
Win32.Trojan.Xema
Win32.Trojan.Zapchast
Win32.Trojan.Zfsearch
Win32.Trojan.Ziki
Win32.Trojan.Zonebac
Win32.TrojanClicker
Win32.TrojanClicker.Delf
Win32.TrojanClicker.VB
Win32.TrojanDownloader.Adload
Win32.TrojanDownloader.Agent
Win32.TrojanDownloader.Autoit
Win32.TrojanDownloader.Bagle
Win32.TrojanDownloader.Banload
Win32.TrojanDownloader.BHO
Win32.TrojanDownloader.Bhosta
Win32.TrojanDownloader.Calac
Win32.TrojanDownloader.Cntr
Win32.TrojanDownloader.CodecPack
Win32.TrojanDownloader.Dadobra
Win32.TrojanDownloader.Delf
Win32.TrojanDownloader.Dlkroha
Win32.TrojanDownloader.Doldow
Win32.TrojanDownloader.Dyfuca
Win32.TrojanDownloader.FakeAlert
Win32.TrojanDownloader.Firu
Win32.TrojanDownloader.Fload
Win32.TrojanDownloader.FlyStudio
Win32.TrojanDownloader.FraudLoad
Win32.TrojanDownloader.Helminthos
Win32.TrojanDownloader.Hmir
Win32.TrojanDownloader.Htool
Win32.TrojanDownloader.Injecter
Win32.TrojanDownloader.LoadAdv
Win32.TrojanDownloader.Mibuv
Win32.TrojanDownloader.Murlo
Win32.TrojanDownloader.Mutant
Win32.TrojanDownloader.Obfuscated
Win32.TrojanDownloader.PromoCarto
Win32.TrojanDownloader.RtkDL
Win32.TrojanDownloader.Small
Win32.TrojanDownloader.Suurch
Win32.TrojanDownloader.Swizzor.bo
Win32.TrojanDownloader.Tibser
Win32.TrojanDownloader.Tiny
Win32.TrojanDownloader.VB
Win32.TrojanDownloader.WMA.GetCodec
Win32.TrojanDownloader.Yektel
Win32.Trojandownloader.Zlob
Win32.TrojanDropper
Win32.Trojan-Dropper.BHO
Win32.Trojan-Dropper.Binder
Win32.Trojan-Dropper.Delf
Win32.Trojan-Dropper.Dorn
Win32.TrojanDropper.ExeBinder
Win32.TrojanDropper.Flystud
Win32.TrojanDropper.HeliosBinder
Win32.TrojanDropper.Hosts
Win32.Trojan-Dropper.Joiner
Win32.TrojanDropper.Keylogger
Win32.TrojanDropper.KGen
Win32.TrojanDropper.Microjoin
Win32.Trojan-Dropper.MSWord.Agent
Win32.Trojan-Dropper.MuDrop
Win32.TrojanDropper.MultiJoiner
Win32.TrojanDropper.Pincher
Win32.Trojan-Dropper.Rootkit
Win32.TrojanDropper.ScriptDrop
Win32.TrojanDropper.Small
Win32.TrojanDropper.Sramler
Win32.TrojanDropper.VB
Win32.TrojanDropper.Zenith
Win32.TrojanMailfinder.Delf
Win32.TrojanProxy.Glukelira
Win32.TrojanProxy.Horst
Win32.TrojanProxy.Mitglieder.bi
Win32.TrojanProxy.Puma
Win32.TrojanProxy.Ranky
Win32.TrojanProxy.Small
Win32.Trojan-PSW.Delf
Win32.Trojan-PSW.Hangame
Win32.Trojan-PSW.Lineage
Win32.Trojan-PSW.Nilage
Win32.Trojan-PSW.QQRob
Win32.Trojan-PSW.Sinowal
Win32.TrojanPWS.Delf
Win32.Trojan-PWS.Firefox
Win32.TrojanPWS.FirePass
Win32.TrojanPWS.Fkantakte
Win32.Trojan-PWS.Flystudio
Win32.Trojan-PWS.Gadu
Win32.Trojan-PWS.Gamec
Win32.Trojan-PWS.Ganhame
Win32.Trojan-PWS.Hazif
Win32.TrojanPWS.Hooker
Win32.Trojan-PWS.Horse
Win32.TrojanPWS.ICQ
Win32.Trojan-PWS.IcqSmiley
Win32.TrojanPWS.IEpass
Win32.Trojan-PWS.IMMultiPass
Win32.TrojanPWS.Kuang
Win32.TrojanPWS.LdPinch
Win32.TrojanPWS.Lmir
Win32.TrojanPWS.Magania
Win32.Trojan-PWS.Maha
Win32.Trojan-PWS.Mapler
Win32.TrojanPWS.Maran
Win32.TrojanPWS.Messen
Win32.Trojan-PWS.Multi
Win32.TrojanPWS.MultiFirst
Win32.TrojanPWS.OnlineGames
Win32.TrojanPWS.Papras
Win32.Trojan-PWS.PdPinch
Win32.Trojan-PWS.Platan
Win32.TrojanPWS.Prostor
Win32.Trojan-PWS.PVStealth
Win32.Trojan-PWS.QQGame
Win32.TrojanPWS.QQPass
Win32.TrojanPWS.QQSender
Win32.Trojan-PWS.QQShou
Win32.TrojanPWS.Redneck
Win32.Trojan-PWS.Sagic
Win32.TrojanPWS.Small
Win32.TrojanPWS.Smym
Win32.TrojanPWS.SocNet
Win32.Trojan-PWS.Stealer
Win32.TrojanPWS.StealPass
Win32.TrojanPWS.Steam
Win32.Trojan-PWS.Sysrater
Win32.Trojan-PWS.Tibia
Win32.TrojanPWS.VB
Win32.TrojanPWS.WebMoner
Win32.TrojanPWS.Vkont
Win32.TrojanPWS.WOW
Win32.Trojan-PWS.YahooPass
Win32.TrojanRansom.Hexzone
Win32.TrojanRansom.Skomaz
Win32.TrojanSpy.Banbra
Win32.TrojanSpy.Bancos
Win32.TrojanSpy.Banker
Win32.TrojanSpy.Broker
Win32.TrojanSpy.BZub
Win32.TrojanSpy.Delf
Win32.TrojanSpy.Espy
Win32.TrojanSpy.Flux
Win32.TrojanSpy.Goldun
Win32.TrojanSpy.IESpy
Win32.TrojanSpy.Keylogger
Win32.TrojanSpy.Pophot
Win32.TrojanSpy.Proagent
Win32.TrojanSpy.Small
Win32.TrojanSpy.TheRat
Win32.TrojanSpy.VB
Win32.TrojanSpy.Zbot
Win32.TrojanSpy.Zeus
Win32.Worm.Agent
Win32.Worm.Allaple
Win32.Worm.AutoIt
Win32.Worm.Autorun
Win32.Worm.AutoTDSS
Win32.Worm.Bagle
Win32.Worm.Beloy
Win32.Worm.Bobic
Win32.Worm.Brontok
Win32.Worm.Doomber
Win32.Worm.Downloader
Win32.Worm.Fabot
Win32.Worm.Glowa
Win32.Worm.Iksmas
Win32.Worm.IMess
Win32.Worm.IRCBot
Win32.Worm.Kido
Win32.Worm.Kolab
Win32.Worm.Kolabc
Win32.Worm.Koobface
Win32.Worm.Leave
Win32.Worm.LovGate
Win32.Worm.Mabezat
Win32.Worm.Mytob
Win32.Worm.Nyxem
Win32.Worm.Padobot
Win32.Worm.Pinit
Win32.Worm.Polip
Win32.Worm.Rbot
Win32.Worm.Runfer
Win32.Worm.Runouce
Win32.Worm.RussoTuristo
Win32.Worm.Sasser
Win32.Worm.SDBot
Win32.Worm.Slenfbot
Win32.Worm.Small
Win32.Worm.Socks
Win32.Worm.Sohanad
Win32.Worm.Waledac
Win32.Worm.Wangy
Win32.Worm.Warezov
Win32.Worm.VB
Win32.Worm.Viking
Win32.Worm.Windaus
Win32.Worm.Zhelatin
WiniGuard
WinXDefender
Virtumonde
XPPoliceAntivirus
Xupiter

MD5 checksum is 5aa94e7973dcb394b8aea74ad348b278 for core.aawdef
MD5 checksum is 39867c78a329db25292e87bb87bdc13c for defs.ref

0146.0010 is now available, new definition file for Ad-Aware Anniversary Edition.


Minor fix release.


MD5 checksum is ef6968d0872a3b73ca3ac154927abbe7 for core.aawdef
MD5 checksum is 98fdb78fc81beefaada9296dc6d0f671 for defs.ref

Protect your privacy with new targets for February 2009 (0144.0000-0146.0009)

Newly created families for February (0144.0000-0146.0009)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Adware.InstallProvider
Adware.Smileydistrict

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Anda
Win32.Backdoor.Backgate
Win32.Backdoor.Cain
Win32.Backdoor.Cnrc
Win32.Backdoor.DarkStorm
Win32.Backdoor.Dolan
Win32.Backdoor.Domy
Win32.Backdoor.Dservice
Win32.Backdoor.Flood
Win32.Backdoor.HDkill
Win32.Backdoor.Ircoon
Win32.Backdoor.Iredor
Win32.Backdoor.Kmedor
Win32.Backdoor.Koutodoor
Win32.Backdoor.Kurbadur
Win32.Backdoor.Mamon
Win32.Backdoor.Mattak
Win32.Backdoor.Monisys
Win32.Backdoor.MSNmaker
Win32.Backdoor.Msynky
Win32.Backdoor.Mybot
Win32.Backdoor.NB20
Win32.Backdoor.OICQSearch
Win32.Backdoor.Papi
Win32.Backdoor.Patriot
Win32.Backdoor.PBot
Win32.Backdoor.Popdoor
Win32.Backdoor.PrxServ
Win32.Backdoor.Psclient
Win32.Backdoor.Recub
Win32.Backdoor.Redkod
Win32.Backdoor.Redspy
Win32.Backdoor.Regap
Win32.Backdoor.RemoteDesk
Win32.Backdoor.RemoteNC
Win32.Backdoor.RemoteRevise
Win32.Backdoor.Remoteshell
Win32.Backdoor.RemoteShut
Win32.Backdoor.remotrol
Win32.Backdoor.Remscan
Win32.Backdoor.Remserv
Win32.Backdoor.Rendez
Win32.Backdoor.Rephlex
Win32.Backdoor.Reporter
Win32.Backdoor.Retig
Win32.Backdoor.Reudor
Win32.Backdoor.Revenge
Win32.Backdoor.Rexx
Win32.Backdoor.Ric
Win32.Backdoor.Ricta
Win32.Backdoor.Ripper
Win32.Backdoor.RM
Win32.Backdoor.RmtSvc
Win32.Backdoor.Robo
Win32.Backdoor.Rocket
Win32.Backdoor.Ronater
Win32.Backdoor.Rootbeer
Win32.Backdoor.Rorex
Win32.Backdoor.RSC
Win32.Backdoor.RsCrt
Win32.Backdoor.Rwins
Win32.Backdoor.Sambus
Win32.Backdoor.Sanctuary
Win32.Backdoor.Sandy
Win32.Backdoor.SatanCrew
Win32.Backdoor.SBD
Win32.Backdoor.Scarab
Win32.Backdoor.Schedan
Win32.Backdoor.School
Win32.Backdoor.Schwindler
Win32.Backdoor.ScreenControl
Win32.Backdoor.Screencut
Win32.Backdoor.Screener
Win32.Backdoor.ScreenGrab
Win32.Backdoor.SecretService
Win32.Backdoor.Senza
Win32.Backdoor.Sequel
Win32.Backdoor.Serv
Win32.Backdoor.ServeMe
Win32.Backdoor.ShadowPhyre
Win32.Backdoor.Shaggy
Win32.Backdoor.Shah
Win32.Backdoor.Shakdos
Win32.Backdoor.Shell
Win32.Backdoor.Shitheep
Win32.Backdoor.Shiver
Win32.Backdoor.Shocki
Win32.Backdoor.Smallx
Win32.Backdoor.Sockets
Win32.Backdoor.Socks
Win32.Backdoor.Solarisdoor
Win32.Backdoor.Sonick
Win32.Backdoor.Sonitro
Win32.Backdoor.Sood
Win32.Backdoor.Spadeace
Win32.Backdoor.Spammer
Win32.Backdoor.Speedup
Win32.Backdoor.Spie
Win32.Backdoor.Spike
Win32.Backdoor.SPing
Win32.Backdoor.Spirit
Win32.Backdoor.Splintex
Win32.Backdoor.Spoofbot
Win32.Backdoor.Spool
Win32.Backdoor.Spotcom
Win32.Backdoor.Starline
Win32.Backdoor.Stats
Win32.Backdoor.Stealthspy
Win32.Backdoor.Stigmador
Win32.Backdoor.Stretch
Win32.Backdoor.Striker
Win32.Backdoor.Stub
Win32.Backdoor.Studio
Win32.Backdoor.Submariner
Win32.Backdoor.Subroot
Win32.Backdoor.Subzero
Win32.Backdoor.Sumatrix
Win32.Backdoor.SuperMM
Win32.Backdoor.SuperSpy
Win32.Backdoor.Swift
Win32.Backdoor.Symes
Win32.Backdoor.SynSpy
Win32.Backdoor.Syph
Win32.Backdoor.Sysinst
Win32.Backdoor.Sysmon
Win32.Backdoor.SysRoot
Win32.Backdoor.Syst
Win32.Backdoor.Systray
Win32.Backdoor.Takit
Win32.Backdoor.Tapitroj
Win32.Backdoor.TCmd
Win32.Backdoor.Telecommando
Win32.Backdoor.TheSpy
Win32.Backdoor.Thingy
Win32.Backdoor.Tomek
Win32.Backdoor.Tongbot
Win32.Backdoor.Traitor
Win32.Backdoor.TrialDest
Win32.Backdoor.Trirat
Win32.Backdoor.Troj2k
Win32.Backdoor.Tromax
Win32.Backdoor.TScout
Win32.Backdoor.Twobotkill
Win32.Backdoor.Ullysee
Win32.Backdoor.Unexplained
Win32.Backdoor.Unifyda
Win32.Backdoor.URat
Win32.Backdoor.VagrNocker
Win32.Backdoor.Wallop
Win32.Backdoor.Vampire
Win32.Backdoor.Wanremote
Win32.Backdoor.Warbot
Win32.Backdoor.Wardoor
Win32.Backdoor.Warin
Win32.Backdoor.Warkosh
Win32.Backdoor.WCRat
Win32.Backdoor.Wdoor
Win32.Backdoor.WebCT2
Win32.Backdoor.WebServLite
Win32.Backdoor.Vecnadoor
Win32.Backdoor.Weiameia
Win32.Backdoor.Whacky
Win32.Backdoor.WH-Crew
Win32.Backdoor.Whirlpool
Win32.Backdoor.Wildek
Win32.Backdoor.Winbach
Win32.Backdoor.WinControl
Win32.Backdoor.Winfiles
Win32.Backdoor.Winmite
Win32.Backdoor.WinOUJ
Win32.Backdoor.Wintrix
Win32.Backdoor.WinUoj
Win32.Backdoor.Visel
Win32.Backdoor.WLF
Win32.Backdoor.WMFA
Win32.Backdoor.WMRemote
Win32.Backdoor.Xenozbot
Win32.Backdoor.Xeol
Win32.Backdoor.XLBH
Win32.Backdoor.XLog
Win32.Backdoor.Xposure
Win32.Backdoor.XQdoor
Win32.Backdoor.Yagoda
Win32.Backdoor.Yajing
Win32.Backdoor.Yurist
Win32.Backdoor.Zdoogu
Win32.Backdoor.Zomby

DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.Benvenuto
Win32.Dialer.InterDialer

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.CodePack
Win32.TrojanDownloader.DLKrus
Win32.TrojanDownloader.Dopip
Win32.TrojanDownloader.Ebill
Win32.TrojanDownloader.Ejik
Win32.TrojanDownloader.Firehell
Win32.TrojanDownloader.Fload
Win32.TrojanDownloader.Hibo
Win32.TrojanDownloader.Klask
Win32.TrojanDownloader.Kriptic
Win32.TrojanDownloader.Nuled
Win32.TrojanDownloader.Plus
Win32.TrojanDownloader.Pufi
Win32.TrojanDownloader.Sality
Win32.TrojanDownloader.SetupFactory
Win32.TrojanDownloader.Sniggast
Win32.TrojanDownloader.Timoha
Win32.TrojanDownloader.Tonick
Win32.TrojanDownloader.WinErrorFixer
Win32.TrojanDownloader.Yektel

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.

Win32.Flooder.Yahoo

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Afigen
Win32.TrojanPWS.Aimgetter
Win32.TrojanPWS.Aimtheef
Win32.TrojanPWS.AolStatus
Win32.TrojanPWS.Avisa
Win32.TrojanPWS.Bedruger
Win32.TrojanPWS.Blade
Win32.TrojanPWS.Cara
Win32.TrojanPWS.Cavespy
Win32.TrojanPWS.Cene2
Win32.TrojanPWS.CheckInet
Win32.TrojanPWS.Cyberdex
Win32.TrojanPWS.Datod
Win32.TrojanPWS.Deat
Win32.TrojanPWS.Delarm
Win32.TrojanPWS.Demowin
Win32.TrojanPWS.Dina
Win32.TrojanPWS.Dracor
Win32.TrojanPWS.Dripper
Win32.TrojanPWS.Drv32
Win32.TrojanPWS.Duck
Win32.TrojanPWS.EQStealer
Win32.TrojanPWS.Espamer
Win32.TrojanPWS.Fakebb
Win32.TrojanPWS.Fakenuke
Win32.TrojanPWS.Fanet
Win32.TrojanPWS.Fina
Win32.TrojanPWS.Fkantakte
Win32.TrojanPWS.Frozenbotii
Win32.TrojanPWS.Gacco
Win32.TrojanPWS.GetQQPass
Win32.TrojanPWS.Gimly
Win32.TrojanPWS.Glacier
Win32.TrojanPWS.Glyph
Win32.TrojanPWS.Habbo
Win32.TrojanPWS.Hackpass
Win32.TrojanPWS.Hapg
Win32.TrojanPWS.Hidep
Win32.TrojanPWS.ICQ_Sniffer
Win32.TrojanPWS.IEpass
Win32.TrojanPWS.Inform
Win32.TrojanPWS.ISPHack
Win32.TrojanPWS.Katalog
Win32.TrojanPWS.Keylogger
Win32.TrojanPWS.Klop
Win32.TrojanPWS.Kukel
Win32.TrojanPWS.Kurgent
Win32.TrojanPWS.Lanzon
Win32.TrojanPWS.LionDumper
Win32.TrojanPWS.Lwpw
Win32.TrojanPWS.Madcap
Win32.TrojanPWS.Madzumba
Win32.TrojanPWS.mailpwl
Win32.TrojanPWS.Mike
Win32.TrojanPWS.Mireye
Win32.TrojanPWS.MMCI
Win32.TrojanPWS.Morose
Win32.TrojanPWS.Movida
Win32.TrojanPWS.Mrija
Win32.TrojanPWS.MSNCookie
Win32.TrojanPWS.Netdog
Win32.TrojanPWS.NewJoke
Win32.TrojanPWS.Nilson
Win32.TrojanPWS.Noter
Win32.TrojanPWS.Novlog
Win32.TrojanPWS.Nuke99
Win32.TrojanPWS.Ohalf
Win32.TrojanPWS.Orgame
Win32.TrojanPWS.Passdumper
Win32.TrojanPWS.Passmonitor
Win32.TrojanPWS.Porn
Win32.TrojanPWS.Prekva
Win32.TrojanPWS.Proctor
Win32.TrojanPWS.Prodoom
Win32.TrojanPWS.Promail
Win32.TrojanPWS.QQBang
Win32.TrojanPWS.QQcv
Win32.TrojanPWS.QQlog
Win32.TrojanPWS.QQThief
Win32.TrojanPWS.Regform
Win32.TrojanPWS.Relikt
Win32.TrojanPWS.Rembomb
Win32.TrojanPWS.RemoteAgent
Win32.TrojanPWS.Ring0
Win32.TrojanPWS.Rohu
Win32.TrojanPWS.Runem
Win32.TrojanPWS.Runescape
Win32.TrojanPWS.Sadam
Win32.TrojanPWS.Shajinag
Win32.TrojanPWS.ShowMyPass
Win32.TrojanPWS.Skyflower
Win32.TrojanPWS.Slydude
Win32.TrojanPWS.Snagger
Win32.TrojanPWS.Snif
Win32.TrojanPWS.Softwar
Win32.TrojanPWS.Sohu
Win32.TrojanPWS.Spaels
Win32.TrojanPWS.SpyCredit
Win32.TrojanPWS.Spyda
Win32.TrojanPWS.Staser
Win32.TrojanPWS.Stealth2
Win32.TrojanPWS.Systemdo
Win32.TrojanPWS.Tailgunner
Win32.TrojanPWS.Tapiconf
Win32.TrojanPWS.Taskman
Win32.TrojanPWS.Teleb
Win32.TrojanPWS.Update
Win32.TrojanPWS.Webro
Win32.TrojanPWS.WinterNights
Win32.TrojanPWS.Virton
Win32.TrojanPWS.Vkont
Win32.TrojanPWS.Yoyo
Win32.TrojanPWS.Zipper

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

AdwareEradicator
AdwareFree
AlphaWipe
AntiMalwareSuite
Antispyware3000
AntispywareProtector
AntiTracksKit
AntivirusXPPro
Bugdoctor
ComputerBlocker
ErrorPatrol
FileFixer
HDriveSweeper
IE-Security
InternetAnonymizer
IntruderTrace
MalwareRemovalBot
NetTurboPro
PasswordInspector
PersonalAntivirus
Security2009
SpyNoMore
SpywareCease
SpywareGuard2009
SpywareProtect2009
SysAntivirus2009
SystemGuard2009
SystemSecurity
TrackZapper
VirusDoctor
XPPoliceAntivirus
XpyBurner

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Activcrk
Win32.Trojan.Agent2
Win32.Trojan.AgentB
Win32.Trojan.AgentMB
Win32.Trojan.Aldy
Win32.Trojan.Befast
Win32.Trojan.Bersek
Win32.Trojan.Bredolab
Win32.Trojan.CableBoost
Win32.Trojan.Cacogen
Win32.Trojan.Cahyna
Win32.Trojan.Camking
Win32.Trojan.Canary
Win32.Trojan.Canasson
Win32.Trojan.Candyma
Win32.Trojan.Cards
Win32.Trojan.Carem
Win32.Trojan.Chantal
Win32.Trojan.Chat
Win32.Trojan.Choke
Win32.Trojan.Christ
Win32.Trojan.C-Killer
Win32.Trojan.Cleanlogs
Win32.Trojan.ClickMe
Win32.Trojan.Cobra
Win32.Trojan.CokeCrack
Win32.Trojan.CokeGift
Win32.Trojan.Compain
Win32.Trojan.Costaro
Win32.Trojan.Covert
Win32.Trojan.Crack
Win32.Trojan.CrazyCD
Win32.Trojan.Crowl
Win32.Trojan.CSKey
Win32.Trojan.Cuhmap
Win32.Trojan.Cuki
Win32.Trojan.CureICQ
Win32.Trojan.Cutespy
Win32.Trojan.Damn
Win32.Trojan.Daodan
Win32.Trojan.Daonol
Win32.Trojan.Dasek
Win32.Trojan.Dasmin
Win32.Trojan.DataDrain
Win32.Trojan.DeadBolt
Win32.Trojan.DeadDuck
Win32.Trojan.Deinonychus
Win32.Trojan.Deshack
Win32.Trojan.DeskPen
Win32.Trojan.Destiny
Win32.Trojan.Devil
Win32.Trojan.Diabolo
Win32.Trojan.Dialui
Win32.Trojan.Dichas
Win32.Trojan.Dickler
Win32.Trojan.Dilya
Win32.Trojan.DiskAdmin
Win32.Trojan.Dmservinf
Win32.Trojan.Donoth
Win32.Trojan.Dosingle
Win32.Trojan.Dxmsmtp
Win32.Trojan.Ecoly
Win32.Trojan.Elitor
Win32.Trojan.Elves
Win32.Trojan.Erase2002
Win32.Trojan.Ertfor
Win32.Trojan.Eurasia
Win32.Trojan.FakeDll
Win32.Trojan.FakeInstaller
Win32.Trojan.Fakev
Win32.Trojan.Farfrom
Win32.Trojan.Fear
Win32.Trojan.Feliz
Win32.Trojan.Fenster
Win32.Trojan.FileMail
Win32.Trojan.FinalX
Win32.Trojan.Findstar
Win32.Trojan.FireAnvil
Win32.Trojan.FireCracker
Win32.Trojan.FireKill
Win32.Trojan.Firma
Win32.Trojan.Flashkiller
Win32.Trojan.Floppymad
Win32.Trojan.Folderfu
Win32.Trojan.FraudTdss
Win32.Trojan.Fupgrade
Win32.Trojan.Gast
Win32.Trojan.Gatez
Win32.Trojan.GDGluck
Win32.Trojan.Genome
Win32.Trojan.Ghost
Win32.Trojan.Giggle
Win32.Trojan.Goblin
Win32.Trojan.GoHotList
Win32.Trojan.Goreg
Win32.Trojan.GotoOne
Win32.Trojan.Guapeton
Win32.Trojan.Gutted
Win32.Trojan.Gyner
Win32.Trojan.Habar
Win32.Trojan.Hackkill
Win32.Trojan.Happyday
Win32.Trojan.Hatu
Win32.Trojan.HDBreaker
Win32.Trojan.Hiloti
Win32.Trojan.IconDance
Win32.Trojan.ImSoft
Win32.Trojan.InactiveDesktop
Win32.Trojan.Inetrack
Win32.Trojan.Jerk
Win32.Trojan.Jerror
Win32.Trojan.Jimmyh
Win32.Trojan.Joiner
Win32.Trojan.Jucons
Win32.Trojan.KeyEmul
Win32.Trojan.KeyJoke
Win32.Trojan.Kident
Win32.Trojan.KingSolaris
Win32.Trojan.Meredrop
Win32.Trojan.Netlog
Win32.Trojan.Night
Win32.Trojan.Nixgen
Win32.Trojan.Nobof
Win32.Trojan.Noodle
Win32.Trojan.NoSpace
Win32.Trojan.OpaKill
Win32.Trojan.Ouper
Win32.Trojan.Paging
Win32.Trojan.Panama
Win32.Trojan.PASSW
Win32.Trojan.Phorse
Win32.Trojan.Piduts
Win32.Trojan.Piptea
Win32.Trojan.Plasming
Win32.Trojan.Plato
Win32.Trojan.Plimo
Win32.Trojan.Poetry
Win32.Trojan.Pokemon
Win32.Trojan.Pokey
Win32.Trojan.Ponograph
Win32.Trojan.Porno
Win32.Trojan.Posm
Win32.Trojan.PowerLoader
Win32.Trojan.Predator
Win32.Trojan.PressEnter
Win32.Trojan.PressPower
Win32.Trojan.Pricol
Win32.Trojan.Prime
Win32.Trojan.Principale
Win32.Trojan.Proghohol
Win32.Trojan.Promise
Win32.Trojan.Proteboy
Win32.Trojan.PTrojan
Win32.Trojan.Puma
Win32.Trojan.Punter
Win32.Trojan.Qipsearch
Win32.Trojan.QQKiller
Win32.Trojan.QQuse
Win32.Trojan.QScreen
Win32.Trojan.Recker
Win32.Trojan.Regback
Win32.Trojan.Retepu
Win32.Trojan.Revenge
Win32.Trojan.Rewin
Win32.Trojan.Revop
Win32.Trojan.Rkproc
Win32.Trojan.Rocket
Win32.Trojan.RTC
Win32.Trojan.Sabine
Win32.Trojan.Sekcja
Win32.Trojan.Sendexe
Win32.Trojan.Sendfile
Win32.Trojan.Seneca
Win32.Trojan.Setcrack
Win32.Trojan.Setme
Win32.Trojan.Sexspeed
Win32.Trojan.Sexu
Win32.Trojan.Sharec
Win32.Trojan.Sheath
Win32.Trojan.Shetr
Win32.Trojan.Shinop
Win32.Trojan.ShowWord
Win32.Trojan.Sima
Win32.Trojan.Singe
Win32.Trojan.Siteno
Win32.Trojan.Sith
Win32.Trojan.Sjkr
Win32.Trojan.Skybot
Win32.Trojan.Slingshot
Win32.Trojan.Slipto
Win32.Trojan.Smallshare
Win32.Trojan.Smalltroj
Win32.Trojan.Smile
Win32.Trojan.Smith
Win32.Trojan.SmogDopper
Win32.Trojan.Sozz
Win32.Trojan.Splad
Win32.Trojan.Sprocit
Win32.Trojan.SQLexec
Win32.Trojan.Sranda
Win32.Trojan.Starfield
Win32.Trojan.StopOffice
Win32.Trojan.SwapMouse
Win32.Trojan.Sweet
Win32.Trojan.Syrus
Win32.Trojan.Sysman
Win32.Trojan.Templar
Win32.Trojan.Tepille
Win32.Trojan.Tetris
Win32.Trojan.Titanic
Win32.Trojan.Trashdir
Win32.Trojan.Trinoo
Win32.Trojan.TudaSuda
Win32.Trojan.Tudo
Win32.Trojan.Tunneler
Win32.Trojan.Tyrant
Win32.Trojan.URLkiller
Win32.Trojan.URLsnoop
Win32.Trojan.Waren
Win32.Trojan.Viahack
Win32.Trojan.Vidal
Win32.Trojan.Vimogatel
Win32.Trojan.Viname
Win32.Trojan.Winexit
Win32.Trojan.WinFuck
Win32.Trojan.Wing
Win32.Trojan.Winkill
Win32.Trojan.Winos
Win32.Trojan.Winshare
Win32.Trojan.Winsock
Win32.Trojan.Wintec
Win32.Trojan.Worom
Win32.Trojan.WT32
Win32.Trojan.Vupdat
Win32.Trojan.Xicq
Win32.Trojan.Xilon
Win32.Trojan.Yangin
Win32.Trojan.Yinker
Win32.Trojan.Younmac
Win32.Trojan.Ystl
Win32.Trojan.Zapchast
Win32.Trojan.Zfsearch
Win32.Trojan.Ziki
Win32.Trojan.Zimbo
Win32.TrojanClicker.Befins
Win32.TrojanClicker.Goalweb
Win32.TrojanClicker.Instas
Win32.TrojanClicker.Klik
Win32.TrojanClicker.Knight
Win32.TrojanClicker.Yobit
Trojan.Win32.Kishk
Trojan.Win32.KKiller
Trojan.Win32.Klap
Trojan.Win32.Kloop
Trojan.Win32.Kof2002
Trojan.Win32.LastTime
Trojan.Win32.Leoch
Trojan.Win32.LockDown
Trojan.Win32.Looper
Trojan.Win32.MakeExt
Trojan.Win32.Maliff
Trojan.Win32.Maradonaex
Trojan.Win32.Masaustu
Trojan.Win32.Memo
Trojan.Win32.Menace
Trojan.Win32.Micreg
Trojan.Win32.Micron
Trojan.Win32.Midgare
Trojan.Win32.MMM
Trojan.Win32.Modelx
Trojan.Win32.Moorhuh
Trojan.Win32.Mooze
Trojan.Win32.MouseDisable
Trojan.Win32.MSSC
Trojan.Win32.MyPic
Trojan.Win32.Namaz
Trojan.Win32.Negasm
Trojan.Win32.Neopat
Trojan.Win32.Nescan
Trojan.Win32.Netconf
Trojan.Win32.NetList

TROJAN.CLICKERS

Trojan.Clicker?s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Clicktonet
Win32.TrojanClicker.Getfound
Win32.TrojanClicker.GreatPage
Win32.TrojanClicker.Myxq
Win32.TrojanClicker.Osewlone
Win32.TrojanClicker.PronClick
Win32.TrojanClicker.Setrix
Win32.TrojanClicker.VBScobb
TrojanDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.
Win32.DoS.ARPKiller
Win32.DoS.DBomb
Win32.DoS.DK-Toybox
Win32.DoS.HTTP
Win32.DoS.Lifeware
Win32.DoS.Soldier
Win32.DoS.Vnuke

TrojanDroppers

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Arar
Win32.TrojanDropper.Axesoft
Win32.TrojanDropper.Calimocho
Win32.TrojanDropper.Checkin
Win32.TrojanDropper.Corty
Win32.TrojanDropper.DelDrive
Win32.TrojanDropper.Dotf
Win32.TrojanDropper.Exal
Win32.TrojanDropper.Fimarker
Win32.TrojanDropper.Flashtron
Win32.TrojanDropper.GiftBinder
Win32.TrojanDropper.Gluer
Win32.TrojanDropper.Gunz
Win32.TrojanDropper.Hostad
Win32.TrojanDropper.Jimmy
Win32.TrojanDropper.Jjoiner
Win32.TrojanDropper.Justas
Win32.TrojanDropper.Kapart
Win32.TrojanDropper.Kbind
Win32.TrojanDropper.KeyLog
Win32.TrojanDropper.Kifer
Win32.TrojanDropper.Launch
Win32.TrojanDropper.NeodurkJoiner
Win32.TrojanDropper.Neojoin
Win32.TrojanDropper.Oblivion
Win32.TrojanDropper.OnlineService
Win32.TrojanDropper.Pswmon
Win32.TrojanDropper.RatPacker
Win32.TrojanDropper.Raven
Win32.TrojanDropper.Runme
Win32.TrojanDropper.Rustok
Win32.TrojanDropper.Seapig
Win32.TrojanDropper.SmokeJoiner
Win32.TrojanDropper.Snowplug
Win32.TrojanDropper.StealthBat
Win32.TrojanDropper.Steelrope
Win32.TrojanDropper.Takill
Win32.TrojanDropper.Tefut
Win32.TrojanDropper.Topbind
Win32.TrojanDropper.Virukit
Win32.TrojanDropper.Zenith

TrojanProxy's

Trojan.Proxy's may open up the infected machine to be used as a proxy server.

Win32.TrojanProxy.Glukelira
Win32.TrojanProxy.Portram
Win32.TrojanProxy.Puma

TrojanSpies

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Ambler
Win32.TrojanSpy.BigBrother
Win32.TrojanSpy.Diakey
Win32.TrojanSpy.Dirt
Win32.TrojanSpy.Elgolf
Win32.TrojanSpy.Fiven
Win32.TrojanSpy.Gritz
Win32.TrojanSpy.IKSlog
Win32.TrojanSpy.Justin
Win32.TrojanSpy.Kbrdspy
Win32.TrojanSpy.Keyhunter
Win32.TrojanSpy.Keysend
Win32.TrojanSpy.Keysom
Win32.TrojanSpy.Megahard
Win32.TrojanSpy.Mells
Win32.TrojanSpy.Microlog
Win32.TrojanSpy.Msdivxdec
Win32.TrojanSpy.NOSKey
Win32.TrojanSpy.Offkey
Win32.TrojanSpy.OICQLog
Win32.TrojanSpy.PSpy
Win32.TrojanSpy.Punk
Win32.TrojanSpy.Recodat
Win32.TrojanSpy.RedSpider
Win32.TrojanSpy.Regcontrol
Win32.TrojanSpy.Smgsrvp
Win32.TrojanSpy.Stonari
Win32.TrojanSpy.Sub7logger
Win32.TrojanSpy.Sysbug
Win32.TrojanSpy.Syslog
Win32.TrojanSpy.SystemSpy
Win32.TrojanSpy.TheRat
Win32.TrojanSpy.Tiberius
Win32.TrojanSpy.Toxicity
Win32.TrojanSpy.TServ
Win32.TrojanSpy.TwkCpl
Win32.TrojanSpy.Typon
Win32.TrojanSpy.Webcheck
Win32.TrojanSpy.WhiteBox
Win32.TrojanSpy.Winhawk
Win32.TrojanSpy.Wsnd
Win32.TrojanSpy.Xinkey
Win32.TrojanSpy.XTK
Win32.TrojanSpy.Yazoka
Win32.TrojanSpy.ZombKeyLog

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Aracib
Win32.Worm.Ariss
Win32.Worm.Autooter
Win32.Worm.Benny
Win32.Worm.Burn
Win32.Worm.Canbis
Win32.Worm.Cervivec
Win32.Worm.Chichis
Win32.Worm.Cholera
Win32.Worm.Clepa
Win32.Worm.Clost
Win32.Worm.Cozit
Win32.Worm.Crock
Win32.Worm.Dccorm
Win32.Worm.Deev
Win32.Worm.Dixie
Win32.Worm.Doomer
Win32.Worm.Downadup
Win32.Worm.FakeNuker
Win32.Worm.Famus
Win32.Worm.Fatcat
Win32.Worm.Fishlet
Win32.Worm.FlyVB
Win32.Worm.Galil
Win32.Worm.Gizmo
Win32.Worm.Goner
Win32.Worm.Gotorm
Win32.Worm.hadra
Win32.Worm.Harex
Win32.Worm.Iglamer
Win32.Worm.Incef
Win32.Worm.Inmota
Win32.Worm.Jalabed
Win32.Worm.Julk
Win32.Worm.Keco
Win32.Worm.Lacon
Win32.Worm.Lorie
Win32.Worm.Lorm
Win32.Worm.Loxar
Win32.Worm.Masana
Win32.Worm.Merond
Win32.Worm.Miti
Win32.Worm.Modnar
Win32.Worm.Myba
Win32.Worm.Naid
Win32.Worm.Neysid
Win32.Worm.Nicehello
Win32.Worm.Outa
Win32.Worm.Pacrac
Win32.Worm.Pimaf
Win32.Worm.Qizy
Win32.Worm.Scooter
Win32.Worm.Sharaa
Win32.Worm.Silewar
Win32.Worm.Silin
Win32.Worm.Silkroad
Win32.Worm.Sober
Win32.Worm.Sramota
Win32.Worm.STD
Win32.Worm.Sunder
Win32.Worm.Sysid
Win32.Worm.Tanger
Win32.Worm.Tempex
Win32.Worm.ThreePigs
Win32.Worm.Toil
Win32.Worm.Wargam
Win32.Worm.Wohar
Win32.Worm.Voltan
Win32.Worm.Wotron
Win32.Worm.Yanker
Win32.Worm.Zoher
Win32.IRCWorm.Acoragil
Win32.IRCWorm.Agent
Win32.IRCWorm.Cari
Win32.IRCWorm.Cure
Win32.IRCWorm.Edoc
Win32.IRCWorm.Erebus
Win32.IRCWorm.Events
Win32.IRCWorm.Fable
Win32.IRCWorm.Family
Win32.IRCWorm.Focus
Win32.IRCWorm.Fono
Win32.IRCWorm.Funstuff
Win32.IRCWorm.Girls
Win32.IRCWorm.Groben
Win32.IRCWorm.Hamster
Win32.IRCWorm.Iblis
Win32.IRCWorm.JeepWarz
Win32.IRCWorm.Keskek
Win32.IRCWorm.Kurwa
Win32.IRCWorm.Mandra
Win32.IRCWorm.NTVCirc
Win32.IRCWorm.Pantare
Win32.IRCWorm.Planet
Win32.IRCWorm.Play
Win32.IRCWorm.Prelud
Win32.IRCWorm.Protector
Win32.IRCWorm.Pucker
Win32.IRCWorm.Quiet
Win32.IRCWorm.Radex
Win32.IRCWorm.Remini
Win32.IRCWorm.Seeder
Win32.IRCWorm.Shorty
Win32.IRCWorm.Sleeper
Win32.IRCWorm.Sonne
Win32.IRCWorm.Supnov
Win32.IRCWorm.Sverige
Win32.IRCWorm.Unable
Win32.IRCWorm.Wally
Win32.IRCWorm.Warez
Win32.IRCWorm.Whacked
Win32.IRCWorm.Yello
Win32.IRCWorm.Zapchast
Win32.IRCWorm.Zelda
Win32.P2PWorm.Copycat
Win32.P2PWorm.Deecee
Win32.P2PWorm.Kevor
Win32.P2PWorm.Mandragore
Win32.P2PWorm.Minirow
Win32.P2PWorm.Momac
Win32.P2PWorm.P2PAdware
Win32.P2PWorm.Steph
Win32.P2PWorm.Tufast
Win32.P2PWorm.Walrain
Win32.P2PWorm.Xerom
Win32.P2PWorm.Zaffi
Win32.P2PWorm.Zaka

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Hoax.BadJoke
Win32.Hoax.VBlaster
Win32.Rootkit.Chksyn
Win32.Rootkit.DarkShell
Win32.Rootkit.Delf
Win32.Rootkit.OGRoot
Win32.Rootkit.Tiny
Win32.TrojanNotifier.Draktor
Win32.TrojanNotifier.Eesdns
Win32.TrojanRansom.Taras