Protect your privacy with new targets for March 2011

by Andy on March 21st, 2011 in .

ADWARE
Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Win32.Adware.PinSearch
Win32.Adware.PlusTab

BACKDOORS
Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.711
Win32.Backdoor.Cvvstealer
Win32.Backdoor.Dusta
Win32.Backdoor.Gippig
Win32.Backdoor.Rosex
Win32.Backdoor.Vortexdoor

DIALERS
Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   
Win32.Dialer.Btv
Win32.Dialer.Capredeam

DOWNLOADERS
Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.TrojanDownloader.Advancedcleaner
Win32.TrojanDownloader.Icehart
Win32.TrojanDownloader.Knigsfot
Win32.TrojanDownloader.Pebox
Win32.TrojanDownloader.Scriptec

FLOODERS
Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   
Win32.Flooder.Dnf

ROGUE ANTI-SPYWARE APPLICATIONS
Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
Win32.FraudTool.AKorea
Win32.FraudTool.AllClean
Win32.FraudTool.AntiPrivacy
Win32.FraudTool.AntiViraAV
Win32.FraudTool.AntivirusNET
Win32.FraudTool.AntivirusSystem2011
Win32.FraudTool.BlueSolution
Win32.FraudTool.Boan365
Win32.FraudTool.CZenNetworks
Win32.FraudTool.DataProtect
Win32.FraudTool.DBClean
Win32.FraudTool.DdosClean
Win32.FraudTool.DGNetworks
Win32.FraudTool.DoctorV
Win32.FraudTool.EclipseAntivirus
Win32.FraudTool.EGN
Win32.FraudTool.Eprotect
Win32.FraudTool.FileMom
Win32.FraudTool.HardClean
Win32.FraudTool.HDScanAntivirus
Win32.FraudTool.InfoCleaner
Win32.FraudTool.InfoCure
Win32.FraudTool.InternetVaccine
Win32.FraudTool.Intmedialab
Win32.FraudTool.JHCompany
Win32.FraudTool.JiniInfo
Win32.FraudTool.LiveBoan
Win32.FraudTool.MegaAntivirus2012
Win32.FraudTool.NKSolution
Win32.FraudTool.PCBoan365
Win32.FraudTool.PcCure
Win32.FraudTool.PCSafeZone
Win32.FraudTool.PCSecurity2011
Win32.FraudTool.PlusBoan
Win32.FraudTool.PrivacyPC
Win32.FraudTool.ProVaccine
Win32.FraudTool.SafePrivate
Win32.FraudTool.SecurityBoan
Win32.FraudTool.Speenus
Win32.FraudTool.Storyt
Win32.FraudTool.UtilCube
Win32.FraudTool.VaccineCheck
Win32.FraudTool.VCBoan
Win32.FraudTool.WindowsAVSoftware
Win32.FraudTool.WindowsCareTool
Win32.FraudTool.WindowsExpressHelp
Win32.FraudTool.WindowsExpressSettings
Win32.FraudTool.WindowsOptimalSettings
Win32.FraudTool.WindowsOptimalSolution
Win32.FraudTool.WindowsOptimalTool
Win32.FraudTool.WindowsProblemsProtector
Win32.FraudTool.WindowsProblemsRemover
Win32.FraudTool.WindowsProblemsSolution
Win32.FraudTool.WindowsProcessesOrganizer
Win32.FraudTool.WindowsSafetyGuarantee
Win32.FraudTool.WindowsSoftwareGuard
Win32.FraudTool.WindowsSoftwareProtection
Win32.FraudTool.WindowsUserSatellite
Win32.FraudTool.WindowsWiseProtection

TROJANS
Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.TrojanRansom.Cryfile
Win32.Trojan.Beeplus
Win32.Trojan.Diple
Win32.Trojan.Eyestye
Win32.Trojan.Fakedefrag
Win32.Trojan.Gazum
Win32.Trojan.Maudi
Win32.Trojan.Menti
Win32.Trojan.Niona
Win32.Trojan.Sisn
Win32.Trojan.Webprefix
Win32.Trojan.Xio
Win32.Trojan.Yoddos

TROJANDDOS
TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Ticker

TROJANDROPPERS
Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.   
Win32.TrojanDropper.Meno
Win32.TrojanDropper.Se
Win32.TrojanDropper.Zdesnado

TROJANNOTIFIERS
Trojan.TrojanNotifiers are trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing the system vulnerability. TrojanNotifiers may thereby compromise system security and user privacy.
Win32.TrojanNotifier.Haxor
Win32.TrojanNotifier.Rip

TROJANSPIES
Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.
Win32.TrojanSpy.Mazpayn

WORMS
Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.Worm.Chiwawah
Win32.Worm.Chunga
Win32.Worm.Snfer

MISCELLANEOUS
This grouping contains other programs.
RelevantKnowledge
Yontoo