Trojan:Win32/Boaxxe.B
TrojanDownloader:Win32/Agent.VT
Win32/Vundo
Vundo is often installed as a browser helper object (BHO) without your consent, by other malware.
This family uses advanced defensive and stealth techniques to escape detection and to hinder removal.
MonitoringTool:Win32/SecondSight
Trojan:Win32/Virtumonde.Q
Trojan:Win32/Alureon.gen
Trojan:Win32/Vundo.EL
TrojanDownloader:ASX/Wimad.gen!A
TrojanDownloader:ASX/Wimad.gen!B
TrojanDownloader:ASX/Wimad.gen!C
TrojanDownloader:ASX/Wimad.gen!D
TrojanDownloader:ASX/Wimad.gen!E
Trojan:Win32/Vundo.gen!F
Trojan:Win32/Vundo.gen!H
Trojan:Win32/Alureon.DH
TrojanSpy:AndroidOS/Walksteal.A
Trojan:MacOS_X/QHost.A
Trojan:MacOS_X/QHost.A is a malicious program that modifies the Hosts file to redirect specific websites to a predetermined IP address.
TrojanDropper:Win32/Rovnix.A
TrojanDropper:Win32/Rovnix.A is a trojan that modifies the New Technology File System (NTFS) boot sector of the hard drive to execute other malware. The trojan also installs a component, detected as Trojan:Win32/Rovnix.A, to restart the computer so the modified NTFS boot sector will execute.
Exploit:SWF/Blacole.E
Exploit:SWF/Blacole.E is the detection for malicious code within specially crafted Adobe Shockwave Flash (.SWF) files. The malicious files are commonly distributed via an exploit kit, known as "Blackhole", within compromised webpages. The malware is capable of redirecting a web browser to another specified website and downloading and executing arbitrary files.
TrojanDownloader:Win32/Kanav.G
TrojanDownloader:Win32/Kanav.G is a trojan that downloads files, which might also be malware. If you have a Battle.net account, it deletes your user settings for that, too. It also collects information about your computer, which it sends to a remote website.