Viruses

16.09.2010

Downloader.Swif.E

Downloader.Swif.E is a Trojan horse that exploits a known vulnerability in Adobe Flash Player in order to download more malware on to the compromised computer.
16.09.2010

Trojan.FakeAV!gen40

Trojan.FakeAV!gen40 is a heuristic detection that may include members of the Trojan.FakeAV family of threats.
16.09.2010

Hacktool.Rootkit!gen

Hacktool.Rootkit!gen is a heuristic detection used to detect threats associated with the Hacktool.Rootkit family of threats.
16.09.2010

Bloodhound.Exploit.359

Bloodhound.Exploit.359 is a heuristic detection for files attempting to exploit the Microsoft WordPad Text Converter Word 97 File Parsing Memory Corruption Vulnerability (BID 43122).
13.09.2010

Trojan.Zbot!gen11

Trojan.Zbot!gen11 is a heuristic detection used to detect threats associated with the Trojan.Zbot family.
10.09.2010

W32.Imsolk.B@mm

W32.Imsolk.B@mm is a mass-mailing worm that also spreads through removable and mapped drives. It additionally spreads through shared folders and instant messaging and attempts to download files on to the compromised computer.
10.09.2010

AndroidOS.FakePlayer.B

AndroidOS.FakePlayer.B is a Trojan horse that attempts to send premium-rate SMS messages to predetermined numbers.
10.09.2010

W32.Downadup!job

W32.Downadup!job is a detection for Windows Scheduler .job files that are created by variants of the W32.Downadup family of worms.
09.09.2010

Bloodhound.Exploit.357

Bloodhound.Exploit.357 is a heuristic detection for files attempting to exploit CVE-2010-2883.
09.09.2010

W32.Unruy!gen2

W32.Unruy!gen2 is a heuristic detection used to detect threats associated with the W32.Unruy family.
09.09.2010

Backdoor.Tidserv!gen7

Backdoor.Tidserv!gen7 is a heuristic detection used to detect threats associated with the Backdoor.Tidserv family.
08.09.2010

ALS.Kenilfe

ALS.Kenilfe is a worm written in the AutoCAD AutoLisp scripting language. It spreads through removable and mapped drives and attempts to download files on to the compromised computer.
06.09.2010

SecurityEssentialFraud

BehaviorSecurityEssentialFraud is a misleading application that may give exaggerated reports of threats on the computer.
06.09.2010

W32.Wapomi!html

W32.Wapomi!html is a detection for .htm, .html, .asp, and .aspx files infected by W32.Wapomi.
03.09.2010

W32.Zeeker

W32.Zeeker is a virus that infects .exe and .scr files. It also attempts to download files on to the compromised computer.
03.09.2010

Packed.Cisabim!gen1

Packed.Cisabim!gen1 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software. This heuristic detection is used to detect threats associated with multiple threat families.
03.09.2010

Trojan.FakeAV!gen39

Trojan.FakeAV!gen39 is a heuristic detection that may include members of the Trojan.FakeAV family of threats.
02.09.2010

Suspicious.Cloud.5.A

Suspicious.Cloud.5.A is a detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers.
02.09.2010

Suspicious.Cloud.5.D

Suspicious.Cloud.5.D is a detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers.