PWS:Win32/OnLineGames.BY
PWS:Win32/Zbot.M
TrojanDownloader:Win32/Banload.HT
PWS:Win32/Gamania.gen!A
PWS:Win32/Ldpinch.EZ
PWS:Win32/Ldpinch.TP
PWS:Win32/Zbot.SI
PWS:Win32/Frethog.MQ
Trojan:Win32/Calelk.C
Trojan:Win32/Ramnit.gen!A
Trojan:Win32/Ramnit.gen!A is a generic detection for a trojan component of the Win32/Ramnit family. The malware uses the infection function of certain variants of Virus:Win32/Ramnit famiy, for example, Virus:Win32/Ramnit.AB.
The trojan spreads by infecting files with certain file extensions. It also injects code into certain processes, and communicates with a remote server to receive certain instructions.
Trojan:Win32/Nedsym.G
Trojan:Win32/Oficla.AH
PWS:Win32/Zbot.gen!AF
Microsoft security software detects and removes this threat.
This threat can steal your personal and financial information. It can also give a hacker access and control of your PC.
It is usually installed by other malware, or via links to hacked or compromised websites sent in spam emails.
The Win32/Zbot family description has more information.
TrojanSpy:Win32/Shiotob.A
TrojanSpy:Win32/Shiotob.A is a trojan that monitors and steals your login credentials for online banking. The trojan also forces the use of Internet Explorer if you use another browser.
Trojan:Win32/EyeStye.B!cfg
Trojan:Win32/EyeStye.B!cfg is the detection for the configuration file used by the Trojan:Win32/EyeStye malware family.
Worm:Win32/Yimfoca.gen!C
Worm:Win32/Yimfoca.gen!C is a worm that spreads to other computers by using certain Instant Messaging (IM) programs. It sends a copy of itself disguised as a link to a codec required to watch a video. When run, it then attempts to stop and disable services including "wuauserv" (Windows Automatic Update) and "MsMpSvc" (Microsoft Malware Protection Service). It also attempts to delete "msseces.exe", a core component of Microsoft Security Essentials and Forefront Endpoint Protection.
Backdoor:Win32/Kelihos.B
Backdoor:Win32/Kelihos.B is a trojan that distributes spam email messages that may contain web links to installers of the trojan. It may also communicate with remote computers to exchange information that it uses to execute various tasks such as sending spam emails, stealing sensitive information, or downloading and executing arbitrary files.