Downloader.Swif.E is a Trojan horse that exploits a known vulnerability in Adobe Flash Player in order to download more malware on to the compromised computer.
Bloodhound.Exploit.359 is a heuristic detection for files attempting to exploit the Microsoft WordPad Text Converter Word 97 File Parsing Memory Corruption Vulnerability (BID 43122).
W32.Imsolk.B@mm is a mass-mailing worm that also spreads through removable and mapped drives. It additionally spreads through shared folders and instant messaging and attempts to download files on to the compromised computer.
ALS.Kenilfe is a worm written in the AutoCAD AutoLisp scripting language. It spreads through removable and mapped drives and attempts to download files on to the compromised computer.
Packed.Cisabim!gen1 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software. This heuristic detection is used to detect threats associated with multiple threat families.
Suspicious.Cloud.5.A is a detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers.
Suspicious.Cloud.5.D is a detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers.