home *** CD-ROM | disk | FTP | other *** search
Text File | 2005-03-21 | 788.6 KB | 28,819 lines |
- <SABSCRIPT>
- <PROCESSDESCRIPTOR>
- <ID>45</ID>
- <PROCESSLIST>
- <PROCESS>OPTIMIZE.EXE</PROCESS>
- <PROCESS>ACTALERT.EXE</PROCESS>
- <PROCESS>OPTIMIZE313.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Avenue Media/Internet Optimizer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TEMP</CONDITION>
- <CONDITION>FILELOCATION~INTERN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>50</ID>
- <PROCESSLIST>
- <PROCESS>WEATHER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WeatherBug</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>58</ID>
- <PROCESSLIST>
- <PROCESS>KEYCOUNT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Keycount Keylogger</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>72</ID>
- <PROCESSLIST>
- <PROCESS>AVSERVE2.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Sasser Internet Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>73</ID>
- <PROCESSLIST>
- <PROCESS>LIVESEXCAMS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>LiveSexCams Dialer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>75</ID>
- <PROCESSLIST>
- <PROCESS>WEBSAVINGSFROMEBATES.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WebSavings</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>76</ID>
- <PROCESSLIST>
- <PROCESS>BARGAINS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BargainBuddy</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>77</ID>
- <PROCESSLIST>
- <PROCESS>MSBB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>n-CASE (SongSpy)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>78</ID>
- <PROCESSLIST>
- <PROCESS>MMOD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula/TopText iLookup.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>79</ID>
- <PROCESSLIST>
- <PROCESS>WTOOLSA.EXE</PROCESS>
- <PROCESS>WTOOLSB.EXE</PROCESS>
- <PROCESS>WTOOLSS.EXE</PROCESS>
- <PROCESS>WSUP.EXE</PROCESS>
- <PROCESS>WINTOOLS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>80</ID>
- <PROCESSLIST>
- <PROCESS>POPSRV225.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Apropos Media/PeopleOnPage.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>94</ID>
- <PROCESSLIST>
- <PROCESS>PURITYSCAN.EXE</PROCESS>
- <PROCESS>PURITYSCAN2.EXE</PROCESS>
- <PROCESS>WINSERVN.EXE</PROCESS>
- <PROCESS>SEAR1.EXE</PROCESS>
- <PROCESS>WAPICC.EXE</PROCESS>
- <PROCESS>WAPIIT.EXE</PROCESS>
- <PROCESS>WAPISU.EXE</PROCESS>
- <PROCESS>WAPISVIT.EXE</PROCESS>
- <PROCESS>WAPISVSU.EXE</PROCESS>
- <PROCESS>WCPCC.EXE</PROCESS>
- <PROCESS>WCPSVSU.EXE</PROCESS>
- <PROCESS>WCPSVTR.EXE</PROCESS>
- <PROCESS>WINSERVS.EXE</PROCESS>
- <PROCESS>WINTSU.EXE</PROCESS>
- <PROCESS>WINTSVCC.EXE</PROCESS>
- <PROCESS>WNSAPICC.EXE</PROCESS>
- <PROCESS>WNSAPISU.EXE</PROCESS>
- <PROCESS>WNSAPISV.EXE</PROCESS>
- <PROCESS>WNSCPSU.EXE</PROCESS>
- <PROCESS>WNSCPSV.EXE</PROCESS>
- <PROCESS>WNSINTIT.EXE</PROCESS>
- <PROCESS>WNSINTSU.EXE</PROCESS>
- <PROCESS>WNSINTSV.EXE</PROCESS>
- <PROCESS>WNSTSSV.EXE</PROCESS>
- <PROCESS>WTSIT.EXE</PROCESS>
- <PROCESS>WTSTR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring/PuritySCAN.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>358</ID>
- <PROCESSLIST>
- <PROCESS>RH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.SmartPops.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~Hopper</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>512</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RUNDLL32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=24795c034a595311eac8039a05abbd0e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>97</ID>
- <PROCESSLIST>
- <PROCESS>INTDEL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>InternetDelivery</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>113</ID>
- <PROCESSLIST>
- <PROCESS>HBSRV.EXE</PROCESS>
- <PROCESS>HBINST.EXE</PROCESS>
- <PROCESS>WEATHERONTRAY.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>114</ID>
- <PROCESSLIST>
- <PROCESS>CS4P028.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Threat (CS4P028)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>115</ID>
- <PROCESSLIST>
- <PROCESS>DAP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Download Accelerator Plus</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~SpeedBit</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>2</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>118</ID>
- <PROCESSLIST>
- <PROCESS>MEMORYWATCHER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Sandboxer (MemoryWatcher).Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>119</ID>
- <PROCESSLIST>
- <PROCESS>REMOVED.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Threat (Removed)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>121</ID>
- <PROCESSLIST>
- <PROCESS>CSREMND.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CasinoOnline</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>122</ID>
- <PROCESSLIST>
- <PROCESS>UPD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Totem</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>127</ID>
- <PROCESSLIST>
- <PROCESS>PRECISIONTIME.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PrecisionTime</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>128</ID>
- <PROCESSLIST>
- <PROCESS>PNETAWARE.EXE</PROCESS>
- <PROCESS>PALTALK.EXE</PROCESS>
- <PROCESS>PALNET.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PalTalk</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>2</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>129</ID>
- <PROCESSLIST>
- <PROCESS>R_SERVER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Remote Administrator</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>1</THREATLEVEL>
- <TERMINATEACTION></TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>161</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.BonziBuddy.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Bonzi</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>156</ID>
- <PROCESSLIST>
- <PROCESS>CMESYS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.GAIN/Gator.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>157</ID>
- <PROCESSLIST>
- <PROCESS>GMT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.GAIN/Gator.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>158</ID>
- <PROCESSLIST>
- <PROCESS>BONZIBDY.EXE</PROCESS>
- <PROCESS>BBSETUPHOM.EXE</PROCESS>
- <PROCESS>BBSMARTSETUP.EXE</PROCESS>
- <PROCESS>BBSMARTSTUBFAL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.BonziBuddy.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>163</ID>
- <PROCESSLIST>
- <PROCESS>LOADER.EXE</PROCESS>
- <PROCESS>CSAOLLDR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=F7184EE4124F294560E7251065A73A3B</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>160</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Sandboxer (MemoryWatcher).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME=Kern32</CONDITION>
- <CONDITION>ORIGINALFILENAME=Kern32.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>162</ID>
- <PROCESSLIST>
- <PROCESS>MWSOEMON.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.MyWebSearch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>164</ID>
- <PROCESSLIST>
- <PROCESS>KEYWORD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Jraun/WinEssential.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>165</ID>
- <PROCESSLIST>
- <PROCESS>ADDESTROYER.EXE</PROCESS>
- <PROCESS>ADDESTROYERINNER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/AdDestroyer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>166</ID>
- <PROCESSLIST>
- <PROCESS>APRLOAD.EXE</PROCESS>
- <PROCESS>APROPOS_CLIENT_LOADER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Apropos Media.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>167</ID>
- <PROCESSLIST>
- <PROCESS>SEARCH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.WhenU.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~WhenU</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>169</ID>
- <PROCESSLIST>
- <PROCESS>STCLOADER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Second Thought.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>170</ID>
- <PROCESSLIST>
- <PROCESS>IEXPLORE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>IExplore Stealth Redirector</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=Redirect.EXE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>171</ID>
- <PROCESSLIST>
- <PROCESS>ALCHEM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Alchem</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>172</ID>
- <PROCESSLIST>
- <PROCESS>SLMSS.EXE</PROCESS>
- <PROCESS>MWSVM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SeekSeek (DefaultSearch)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>173</ID>
- <PROCESSLIST>
- <PROCESS>DPCPROXY.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Dpcproxy</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>174</ID>
- <PROCESSLIST>
- <PROCESS>WINST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Winst</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>176</ID>
- <PROCESSLIST>
- <PROCESS>IEXPLORESKINS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>178</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Calling Home</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~callinghome</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>179</ID>
- <PROCESSLIST>
- <PROCESS>NDRV.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring/PuritySCAN.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>180</ID>
- <PROCESSLIST>
- <PROCESS>CASINO.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Casino Games (Golden Palace Casino)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>181</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.GAIN/Gator.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=Trickler.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>182</ID>
- <PROCESSLIST>
- <PROCESS>IDHOST.EXE</PROCESS>
- <PROCESS>HTHOST.EXE</PROCESS>
- <PROCESS>IDMUN.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Cydoor (TOPicks)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>183</ID>
- <PROCESSLIST>
- <PROCESS>YYHLNBAE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Calling Home (Variant 1)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>184</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>iGetNet Natural Language Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~igetnet</CONDITION>
- <CONDITION>ORIGINALFILENAME=WinStart.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>185</ID>
- <PROCESSLIST>
- <PROCESS>KEENVALUE.EXE</PROCESS>
- <PROCESS>KWM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EUniverse KeenValue</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>186</ID>
- <PROCESSLIST>
- <PROCESS>POWERSCAN.EXE</PROCESS>
- <PROCESS>ISTSVC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.IST/ISTBar (Slotch Bar).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>187</ID>
- <PROCESSLIST>
- <PROCESS>OMNISCIENT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows SearchAssistant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>356</ID>
- <PROCESSLIST>
- <PROCESS>VIRTUALBOUNCER.EXE</PROCESS>
- <PROCESS>VBOUNCERINNER1007.EXE</PROCESS>
- <PROCESS>VBOUNCEROUTER1402030731.EXE</PROCESS>
- <PROCESS>VBOUNCERINNER.EXE</PROCESS>
- <PROCESS>BUNDLEOUTER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>188</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Thunderdome</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~thunderdome</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>189</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Totempole</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~totempole</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>190</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WinPup (winpup.exe)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=winpup.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>191</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WinPup (comms.exe)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=comms.exe</CONDITION>
- <CONDITION>INTERNALNAME=comms</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>192</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WinPup (syscm.exe)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=syscm.exe</CONDITION>
- <CONDITION>INTERNALNAME=syscm</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>193</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WinPup (pup.exe)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=pup.exe</CONDITION>
- <CONDITION>INTERNALNAME=pup</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>194</ID>
- <PROCESSLIST>
- <PROCESS>AGENTSVR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS Agent Server</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME^AgentSvr.exe</CONDITION>
- <CONDITION>COMPANYNAME^Microsoft Corporation</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>195</ID>
- <PROCESSLIST>
- <PROCESS>DW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.DownloadWare.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME=DownloadWare</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>196</ID>
- <PROCESSLIST>
- <PROCESS>SE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Search-Exe.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~se</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>197</ID>
- <PROCESSLIST>
- <PROCESS>WUPDATER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EUniverse Wupdater</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>198</ID>
- <PROCESSLIST>
- <PROCESS>SAHAGENT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.ShopAtHomeSelect.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>199</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ExactSearchBar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=exactUpdate.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>200</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME=Clear Search</CONDITION>
- <CONDITION>ORIGINALFILENAME=Loader.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>201</ID>
- <PROCESSLIST>
- <PROCESS>IINSTALL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.IST/ISTBar (Slotch Bar).Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TEMP</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>202</ID>
- <PROCESSLIST>
- <PROCESS>WUPDT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Win Server Updt</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>203</ID>
- <PROCESSLIST>
- <PROCESS>SYNC.EXE</PROCESS>
- <PROCESS>CLOCKSYNCINST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ClockSync</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>204</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.WhenU.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~WhenU.com</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>205</ID>
- <PROCESSLIST>
- <PROCESS>QBKGUW.EXE</PROCESS>
- <PROCESS>VVZ.EXE</PROCESS>
- <PROCESS>D3LO.EXE</PROCESS>
- <PROCESS>APPIW32.EXE</PROCESS>
- <PROCESS>CFIB.EXE</PROCESS>
- <PROCESS>5CYWE.EXE</PROCESS>
- <PROCESS>GZNVJQV.EXE</PROCESS>
- <PROCESS>AGGTWA.EXE</PROCESS>
- <PROCESS>EDXJSI.EXE</PROCESS>
- <PROCESS>AITYTW.EXE</PROCESS>
- <PROCESS>MJQJGMYO.EXE</PROCESS>
- <PROCESS>MSHVFW.EXE</PROCESS>
- <PROCESS>GSJDMG.EXE</PROCESS>
- <PROCESS>BOWIXI.EXE</PROCESS>
- <PROCESS>SWEZTD.EXE</PROCESS>
- <PROCESS>KUJFUG.EXE</PROCESS>
- <PROCESS>IDWDSVPS.EXE</PROCESS>
- <PROCESS>XUVVTTFC.EXE</PROCESS>
- <PROCESS>WMYXN.EXE</PROCESS>
- <PROCESS>IPOQDDS.EXE</PROCESS>
- <PROCESS>IFGPB.EXE</PROCESS>
- <PROCESS>PZCZZFP.EXE</PROCESS>
- <PROCESS>DIMSTLA.EXE</PROCESS>
- <PROCESS>XOQEHH.EXE</PROCESS>
- <PROCESS>MSOO.EXE</PROCESS>
- <PROCESS>QXTGWL.EXE</PROCESS>
- <PROCESS>ESHQKWM.EXE</PROCESS>
- <PROCESS>HXVHDMS.EXE</PROCESS>
- <PROCESS>MSUPD5.EXE</PROCESS>
- <PROCESS>OPGCPQRW.EXE</PROCESS>
- <PROCESS>BRETIUXH.EXE</PROCESS>
- <PROCESS>CNETCFG8.EXE</PROCESS>
- <PROCESS>ANVVKNE.EXE</PROCESS>
- <PROCESS>GDMEX.EXE</PROCESS>
- <PROCESS>WKNAPXOK.EXE</PROCESS>
- <PROCESS>MHNTACHY.EXE</PROCESS>
- <PROCESS>TKYWV.EXE</PROCESS>
- <PROCESS>MRHLGFPR.EXE</PROCESS>
- <PROCESS>PYINTAU.EXE</PROCESS>
- <PROCESS>TOUDDNYP.EXE</PROCESS>
- <PROCESS>TPIE.EXE</PROCESS>
- <PROCESS>VHTPQVZO.EXE</PROCESS>
- <PROCESS>XDE55805.EXE</PROCESS>
- <PROCESS>TQEZEGS.EXE</PROCESS>
- <PROCESS>NTPGGIM.EXE</PROCESS>
- <PROCESS>OHEJHQPW.EXE</PROCESS>
- <PROCESS>NCKP.EXE</PROCESS>
- <PROCESS>HLOZQA.EXE</PROCESS>
- <PROCESS>SHMRSKO.EXE</PROCESS>
- <PROCESS>SHURAES.EXE</PROCESS>
- <PROCESS>LYPUQUOT.EXE</PROCESS>
- <PROCESS>UZBJGFAI.EXE</PROCESS>
- <PROCESS>NMLAZT.EXE</PROCESS>
- <PROCESS>TBSKDY.EXE</PROCESS>
- <PROCESS>RQEOXPDE.EXE</PROCESS>
- <PROCESS>YVSDV.EXE</PROCESS>
- <PROCESS>WVWUGY.EXE</PROCESS>
- <PROCESS>YQOKSVOE.EXE</PROCESS>
- <PROCESS>TWUGCK.EXE</PROCESS>
- <PROCESS>MXNEGI.EXE</PROCESS>
- <PROCESS>DNNUYJ.EXE</PROCESS>
- <PROCESS>IETEREU.EXE</PROCESS>
- <PROCESS>ZDABLPU.EXE</PROCESS>
- <PROCESS>EIGNDDXW.EXE</PROCESS>
- <PROCESS>PWDRZG.EXE</PROCESS>
- <PROCESS>KIDKQVC.EXE</PROCESS>
- <PROCESS>HMJRDK.EXE</PROCESS>
- <PROCESS>BJENFZDK.EXE</PROCESS>
- <PROCESS>EQDDIC.EXE</PROCESS>
- <PROCESS>IKPGQL.EXE</PROCESS>
- <PROCESS>CKUFNK.EXE</PROCESS>
- <PROCESS>SSETYTO.EXE</PROCESS>
- <PROCESS>A3D05255.EXE</PROCESS>
- <PROCESS>YLYZOYS.EXE</PROCESS>
- <PROCESS>JQQREPEO.EXE</PROCESS>
- <PROCESS>UXYLAUZ.EXE</PROCESS>
- <PROCESS>OFFOQRUW.EXE</PROCESS>
- <PROCESS>TQLVPZ.EXE</PROCESS>
- <PROCESS>FGGJWUW.EXE</PROCESS>
- <PROCESS>GFSKQUQI.EXE</PROCESS>
- <PROCESS>BSUYDHJO.EXE</PROCESS>
- <PROCESS>RXRTNQ.EXE</PROCESS>
- <PROCESS>QHIARBD.EXE</PROCESS>
- <PROCESS>QPAPPE.EXE</PROCESS>
- <PROCESS>IKHNBVRN.EXE</PROCESS>
- <PROCESS>FDJFOCV.EXE</PROCESS>
- <PROCESS>XMGUODR.EXE</PROCESS>
- <PROCESS>RRWKWO.EXE</PROCESS>
- <PROCESS>WVGXJDN.EXE</PROCESS>
- <PROCESS>GWEEDSHA.EXE</PROCESS>
- <PROCESS>WYYURR.EXE</PROCESS>
- <PROCESS>JJQBAC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Uncategorized Pests</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>207</ID>
- <PROCESSLIST>
- <PROCESS>DPI.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Dpi Trojan Downloader</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~COMMON</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>208</ID>
- <PROCESSLIST>
- <PROCESS>DMSERVER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Comet DMServer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~BIN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>209</ID>
- <PROCESSLIST>
- <PROCESS>BTV.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BTV Dialer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>210</ID>
- <PROCESSLIST>
- <PROCESS>RBENH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>RapidBlaster</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~RBENHANCE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>213</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Runpool</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~ndsrch.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>214</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CouponDeals (CDCORE.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~cdcore.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>215</ID>
- <PROCESSLIST>
- <PROCESS>WEBREBATES0.EXE</PROCESS>
- <PROCESS>WEBREBATES1.EXE</PROCESS>
- <PROCESS>WEBREBATES.EXE</PROCESS>
- <PROCESS>DJTOPR1150.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Avenue Media/Web Rebates (TopRebates).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>216</ID>
- <PROCESSLIST>
- <PROCESS>MYDAIL~1.EXE</PROCESS>
- <PROCESS>MYDAILYHOROSCOPE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>My Daily Horoscope</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>217</ID>
- <PROCESSLIST>
- <PROCESS>GOIDR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Goidr</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>222</ID>
- <PROCESSLIST>
- <PROCESS>JAWA32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Jawa32</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~WINDOWS\JAWA32.EXE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>218</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Wincore</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~wincore.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>219</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CouponDeals (CDSYNC.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~cdsync.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>220</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CouponDeals (CDISP.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~cdisp.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>221</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CouponDeals (CDRULES.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~cdrules.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>223</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.BetterInternet.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~BetterInternet</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>224</ID>
- <PROCESSLIST>
- <PROCESS>HOT_TARTS.EXE</PROCESS>
- <PROCESS>HOT_TARTS_MC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Hot_tarts</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>225</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Temp EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Temp</CONDITION>
- <CONDITION>INTERNALNAME~Temp Internal</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>383</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>POP225.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{645FD3BC-C314-4F7A-9D2E-64D62A0FDD78}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Apropos Media/PeopleOnPage.Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>268</ID>
- <PROCESSLIST>
- <PROCESS>WUAMGRD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Wuamgrd Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>270</ID>
- <PROCESSLIST>
- <PROCESS>SCVHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Scvhost Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>282</ID>
- <PROCESSLIST>
- <PROCESS>EASYWWW2.EXE</PROCESS>
- <PROCESS>EASYWWW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EasyWWW</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>283</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EasyWWW (Redirect) / Dot Com Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME~redirect</CONDITION>
- <CONDITION>INTERNALNAME~redirect</CONDITION>
- <CONDITION>PRODUCTNAME~project</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>291</ID>
- <PROCESSLIST>
- <PROCESS>WINUPDT.EXE</PROCESS>
- <PROCESS>WINKA.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Trojan.Winupdt</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~WINDUPDATES</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>309</ID>
- <PROCESSLIST>
- <PROCESS>CASHBACK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CashBack</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>310</ID>
- <PROCESSLIST>
- <PROCESS>NLS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NaviSearch</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~NAVISEARCH</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>313</ID>
- <PROCESSLIST>
- <PROCESS>TSADBOT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TimeSink (TSAdBot)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>314</ID>
- <PROCESSLIST>
- <PROCESS>SHOWBEHIND.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ShowBehind</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>322</ID>
- <PROCESSLIST>
- <PROCESS>SVCHOSTS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Svchosts</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>323</ID>
- <PROCESSLIST>
- <PROCESS>NVSCV.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Nvscv</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>334</ID>
- <PROCESSLIST>
- <PROCESS>PIB.EXE</PROCESS>
- <PROCESS>TBPS.EXE</PROCESS>
- <PROCESS>TBPSSVC.EXE</PROCESS>
- <PROCESS>WSG.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TOOLBAR</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>339</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8952A998-1E7E-4716-B23D-3DBE03910972}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>340</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WTOOLSB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{87766247-311C-43B4-8499-3D5FEC94A183}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>341</ID>
- <PROCESSLIST>
- <PROCESS>NEXTAXHA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6FAD625C-9814-50B3-8224-65550DF22B62}</CLSID>
- </CLSIDLIST>
- <SUMMARY>NEXTAXHA.DLL BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>342</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>POP225.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{65C8C1F5-230E-4DC9-9A0D-F3159A5E7778}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Apropos Media/PeopleOnPage.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>343</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MWSBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{07B18EA1-A523-4961-B6BB-170DE4475CCA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.MyWebSearch.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>344</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MWSSRCAS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00A6FAF1-072E-44CF-8957-5838F569A31D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.MyWebSearch.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>345</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TWAINTEC.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{000020DD-C72E-4113-AF77-DD56626C6C42}</CLSID>
- </CLSIDLIST>
- <SUMMARY>TwaintecObj Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>346</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000EF1-0786-4633-87C6-1AA7A44296DA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>F1 Organizer Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>347</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SIDESEARCH1500.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000762-3965-4A1A-98CE-3D4BF457D4C8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Sidesearch BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>348</ID>
- <PROCESSLIST>
- <PROCESS>CSIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>349</ID>
- <PROCESSLIST>
- <PROCESS>CSBB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{00000000-0000-0000-0000-000000002230}</CLSID>
- <CLSID>{23E84039-3F61-4BEB-A6AE-B182A821061C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~CSBB</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>350</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CDSM32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{965A592F-8EFA-4250-8630-7960230792F1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Second Thought.URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>351</ID>
- <PROCESSLIST>
- <PROCESS>SED.EXE</PROCESS>
- <PROCESS>SE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Uncategorized Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNCATEGORIZED</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~\SED\</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>352</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CouponAge (CASYNC.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~casync.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>353</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.CouponAge.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~cacore.dll</CONDITION>
- <CONDITION>COMMANDLINE~docore.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>354</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>6IO4SVC.DLL</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~6io4svc.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>355</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ClearSearch Loader (Variant 2)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME=ClearSearch</CONDITION>
- <CONDITION>ORIGINALFILENAME=Loader.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>359</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HTCHECK2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0352960F-47BE-11D5-AB93-00D0B760B4EB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Cydoor (TOPicks BHO)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>360</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TPBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{80E81A0E-9741-4FBC-8EE3-3B78C04ADA1D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Cydoor (TOPicks Toolbar)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>362</ID>
- <PROCESSLIST>
- <PROCESS>WO.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WO.EXE (EARN)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~EARN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>364</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>eXact Adversiting .EXE Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~eXact Advertising</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>365</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSBE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F4E04583-354E-4076-BE7D-ED6A80FD66DA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ADP UrlCatcher Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>366</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSCB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CE188402-6EE7-4022-8868-AB25173A3E14}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CB UrlCatcher Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>367</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>APUC.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CE31A1F7-3D90-4874-8FBE-A5D97F8BC8F1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>UrlCatcher Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>368</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TIRSRQPW.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C3ED6E0C-A773-6D46-8AF5-8BA0901209CA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>369</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NVMS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344}</CLSID>
- </CLSIDLIST>
- <SUMMARY>NLS UrlCatcher Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>370</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0019C3E2-DD48-4A6D-ABCD-8D32436323D9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CExtension Object BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>372</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TargetSoft (Winupd)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~winupd.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>374</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>6RO4SVC.DLL</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~6ro4svc.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>376</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>2*DSRCH.DLL</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~2</CONDITION>
- <CONDITION>COMMANDLINE~DSRCH.DLL</CONDITION>
- <CONDITION>COMMANDLINE~UMonitor</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>377</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>COREAK.DLL</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~COREAK.DLL</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>378</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{339BB23F-A864-48C0-A59F-29EA915965EC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>379</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINB2S32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{52FE5233-367C-4EFB-BDD7-0BE4D212C107}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Begin2Search.Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>380</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINB2S32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4D568F0F-8AC9-40AB-88B7-415134C78777}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Begin2Search.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>381</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SYSTB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{01F44A8A-8C97-4325-A378-76E68DC4AB2E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IE Plugin Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>382</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LOCALNRD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00320615-B6C2-40A6-8F99-F1C52D674FAD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Transponder Parasite Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>384</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>YSB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{86227D9C-0EFE-4f8a-AA55-30386A3F5686}</CLSID>
- </CLSIDLIST>
- <SUMMARY>YourSiteBar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>385</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown rundll32 Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~{</CONDITION>
- <CONDITION>COMMANDLINE~}</CONDITION>
- <CONDITION>COMMANDLINE~.DLL</CONDITION>
- <CONDITION>COMMANDLINE~UMonitor</CONDITION>
- <CONDITION>COMMANDLINE~,</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>386</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>POP225.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7DD95801-9882-11CF-9FA9-00AA006C42C4}</CLSID>
- <CLSID>{8023A3E7-AB95-4C23-8313-0BE9842CC70E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Apropos Media/PeopleOnPage.Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>387</ID>
- <PROCESSLIST>
- <PROCESS>FLASHTALK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FlashTalk</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>388</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SIDESEARCH1400.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{000007AB-7059-463E-BD44-101A1750D732}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Lycos/SideSearch.Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>389</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MWSBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{07B18EA9-A523-4961-B6BB-170DE4475CCA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.MyWebSearch.Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>390</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~eZula</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>391</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DHBRWSR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DealHelper Dhbrwsr Module</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~dhbrwsr</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>392</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SALE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.180solutions/Search Assistant.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~180solutions</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>393</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DHSVR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DealHelper Dhsvr Module</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~dhsvr</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>394</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DHUPDT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DealHelperUpdate</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~DealHelperUpdate</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>395</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TVMBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{20EC3D2D-33C1-4C9D-BC37-C2D500688DA2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>TV Media URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>533</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BCPC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BCPC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0923492530bf99be2a89d4a844d8f7c0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>398</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DS3DEX.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DS3DEX.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=54ea5e9d9250ecd1256c529aced07bd3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>399</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ITIBS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ITIBS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=73637525245f1d441290180b6cb7bf27</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>400</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BGLABOH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.180solutions/Search Assistant.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bf8489ef5e9bdfc21ffd2b7de5bb546c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>401</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BW.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW.EXE Loader Application (Variant 1)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a54f8ba1f87aa64a962a28c20205fc3b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>402</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FOUQCOB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FOUQCOB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b65324bcdc08c1dedca9fa77cd20b5bc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>403</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LAPCEDIT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>LAPCEDIT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9a3de9c6392d6b20d9aa8ccb573895fd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>404</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SBKFAH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SBKFAH.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bf8489ef5e9bdfc21ffd2b7de5bb546c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>406</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SEARCH~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{907CA0E5-CE84-11D6-9508-02608CDD2846}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SearchSquire BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>407</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MXTARGET.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0000607D-D204-42C7-8E46-216055BF9918}</CLSID>
- </CLSIDLIST>
- <SUMMARY>www.mx-targeting.com BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>408</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MYBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0494D0D9-F8E0-41ad-92A3-14154ECE70AC}</CLSID>
- <CLSID>{0494D0D1-F8E0-41ad-92A3-14154ECE70AC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MySearch Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>409</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PYTPUI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PYTPUI.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=cff892b5b63bb48704f5191ceed780d5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>411</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ONGMLSH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ONGMLSH.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4a6f54fc8c38e46363f4465a718cbbdc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>412</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(JWVPPC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>JWVPPC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e37cb1e20ba8db50e572fc801d3c9e5e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>413</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(JWVPPD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>JWVPPD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=60c11ea56a17dee28be6572380f23992</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>414</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TIMESYNCHRONIZE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DealHelper (TIMESYNCHRONIZE.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=53fa6bc4a5dc05b17149b5580ef19c2a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>415</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TXDESUF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TXDESUF.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a0be820de580145f3cf9813178663d8a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>416</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SHOPINST.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SHOPINST.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3bd34e4a37c44a07c72687d559bc2bc0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>417</ID>
- <PROCESSLIST>
- <PROCESS>CXTPLS_LOADER.EXE</PROCESS>
- <PROCESS>CXTPLS_LOADER_FF.EXE</PROCESS>
- <PROCESS>CXTPLS~1.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Apropos Media/CxtPls.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>418</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BS5-TSRKQN.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BS5-TSRKQN.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b9f717215c98db6b1a9e7b3e87588dd8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>419</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(2517040824.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>2517040824.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=15e3862ad2c276c4275bc0c812499995</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>420</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(2504040901.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>2504040901.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=256ba9c85a9899e6bb7ca3f7d911302c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>421</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(STC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Second Thought.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9f728d660a67fdb4fe896283194140aa</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>422</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUNDLES53.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Second Thought.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8ab01040b344389e218b9bb9661d82f0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>423</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUNDLES118.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Second Thought.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=75dafd13a33ef0e954765a06511b9eec</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>424</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUNDLES.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BUNDLES.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=194da93fe5b56abdbad5ef5f3793fc21</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>425</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUNDLEOUTER2601031121.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Second Thought.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=af1a9729003872341d84c5596c2e75ac</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>426</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BDL14108.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BDL14108.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f9531200c381331a6fe0a59dbcfeb55e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>427</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GLB1.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GLB1.TMP</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=383c48d85f10760530de08679220613e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>428</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GLB2E.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GLB2E.TMP</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=96d162ed3bd1b4a4a45b0b7a44b66c51</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>429</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GLB32.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GLB32.TMP</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=65dba6dd9dd5408d877f2bdf346896db</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>430</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GLB3F.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GLB3F.TMP</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f5302767862bd7ccce8cb9074e91b614</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>431</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FREEBIRD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b3feda7a21598a9916da44ab9345658f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>432</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OBJ WMA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=37478a6705dddd208fbbdb69a8b393f8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>433</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SEARCHUPGRADER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SEARCHUPGRADER.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2441d14b86f145357229070811601c01</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>434</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VERN16.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>VERN16.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f4b4fb33b2de3fab5c0c8b6c25cc4e5f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>435</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SETUP_SILENT_17086.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SETUP_SILENT_17086.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=394bd31f1aec8f769fdec2d5cf5be8d2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>436</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SVCMM32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>n-lite (SVCMM32.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~svcmm32.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>437</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AXACY.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>AXACY.EXE Trojan Downloader</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1180177b4f649295a626022048618d2c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>438</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SEARCHUPDATE33.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Search Squid (SEARCHUPDATE33.EXE)
- </SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ccb97f720fa2c93ea901d46361c4728b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>439</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LAZKNAB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Search Squid (LAZKNAB.EXE)
- </SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bf8489ef5e9bdfc21ffd2b7de5bb546c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>440</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BAGSMEET.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2893d1a7d1a69bdac0c1e4b07a6383c2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>441</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BIRD32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c9cdeb55d49a6e40e8a27cacbe7c4e6c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>442</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DVD AXIS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7a2743763f51e5a377ba59f6a420bac6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>443</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FLAG FLAP GREAT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4851c52758f628c1f78aad431241da70</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>444</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ILSRRFTW.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2893d1a7d1a69bdac0c1e4b07a6383c2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>445</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RULE WAVE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1200e9aefce0dcb1f3290ed657a1f4e6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>446</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TEAMDEFAULTTONSPROXY.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9d293408cf06a0a1ed53a3ca6141be70</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>447</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(F358765.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>F358765.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=cff892b5b63bb48704f5191ceed780d5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>448</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(!UPDATE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>!UPDATE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=751a7f27d8462de68341844026dd859f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>449</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ADDESTROYERINNER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/AdDestroyer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ef48e5a760ec85139ee944b1578a3a76</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>450</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VBOUNCERINNER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8aa63e9cf56967f03cec8fb0dce928c1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>451</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VIRTUALBOUNCER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f2d7af892975006117b6763a71b73cce</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>452</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SETUP_SILENT_26222.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SETUP_SILENT_26222.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=de0e2091bb4a8747fac15f9d4f327ce1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>453</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KYWKPU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>KYWKPU.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=cff892b5b63bb48704f5191ceed780d5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>454</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MEGASEAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-C0FF-FA7FB592BF30}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MEGASEAR Toolbar (MEGASEAR.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>455</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MEGASEAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-C0FF-FA7FB592BF30}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MEGASEAR BHO (MEGASEAR.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>456</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CHKNTFS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d9c6b7308091ea2b9a4e1da0b9353b8c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>457</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WTMP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WTMP.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d806203ef8eb84f1df8f888170532e86</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>458</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SPOOLSV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8555a6c1fa3419add0e6eeeb4c9ee89e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>459</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CPYDMH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.180solutions/Search Assistant.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bf8489ef5e9bdfc21ffd2b7de5bb546c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>460</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>INCFIN~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{5D60FF48-95BE-4956-B4C6-6BB168A70310}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.IncrediFind.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>461</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>OGBFIKY.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{38FF6155-C545-05B5-8328-65550DF62A38}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (OGBFIKY.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>462</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DVD AXIS.EXE)</PROCESS>
- <PROCESS>(YWDPQILE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=caa80dfd71228ea0c352ef0a8204d3dc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>463</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BW.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW.EXE Loader Application (Variant 2)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=76cf69471dc0965d13b8501df29f45eb</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>464</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(INETFUEL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Lookme-C Trojan Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a11de8976d93336fc0a40f489ba01aeb</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>465</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(HEART 4.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8095cfcddd4f621dc1c124eefe6d60ab</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>466</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MIPL9X4.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MIPL9X4.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e7fcd9b638b84aab50acff6105592589</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>467</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WOWEX32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Sandboxer (MemoryWatcher).Process (Variant 1)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9db7ba8e8f0507d5985768a78b083327</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>468</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WOWEX32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Sandboxer (MemoryWatcher).Process (Variant 2)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~wowex32</CONDITION>
- <CONDITION>PRODUCTNAME~wowex32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>469</ID>
- <PROCESSLIST>
- <PROCESS>BW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW.EXE Loader Application (Variant 3)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TEMP</CONDITION>
- <CONDITION>CMDLINEARGS~.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>470</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINSPOOL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a90994a99dc66c0cd043974659aaee9c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>471</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Kudd.com Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~kudd.com</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>1</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>472</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CREATEAMONSTER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Kudd.com Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9ad39cfbb4320d2e8462b39f5e79f267</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>1</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>473</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CREATEAMONSTER.TMP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Kudd.com Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7e3fe2bfe6c46028bf5f60cd5f162b42</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>1</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>474</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CHOOSEYOURPRESIDENT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Kudd.com Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8f88f54401dab8a4cefe5f9768949e59</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>1</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>601</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HYPERBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4B2F5308-2CB0-40E2-8030-59936ED5D22C}</CLSID>
- <CLSID>{1BC1FC4B-B0D2-4D8D-9307-2E40E2A8C257}</CLSID>
- </CLSIDLIST>
- <SUMMARY>HyperBHO BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>479</ID>
- <PROCESSLIST>
- <PROCESS>MEDLOAD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Medload Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~medload</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>480</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>webHancer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~webHancer</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>481</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MEDIAMOTOR25.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MediaMotor</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0e8343d1b26fc6d9624d2f47c387d063</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>482</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WebSpecials</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~webspec.dll</CONDITION>
- <CONDITION>CMDLINEARGS~webspec.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>483</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WHIEHLPR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{c900b400-cdfe-11d3-976a-00e02913a9e0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>webHancer BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>484</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>3_0_1BROWSERHELPER3.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C5941EE5-6DFA-11D8-86B0-0002441A9695}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (3_0_1BROWSERHELPER3.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>485</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NETI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{BCF96FB4-5F1B-497B-AECC-910304A55011}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CHungryBHO Object (NETI.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>486</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IEBHOS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3643ABC2-21BF-46B9-B230-F247DB0C6FD6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CControl Object (IEBHOS.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>487</ID>
- <PROCESSLIST>
- <PROCESS>RADIO.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=172b61756dbb1dda4068fc6b80be1964</CONDITION>
- <CONDITION>MD5=0d2d661202ed8fd08cef0cb7b121ca52</CONDITION>
- <CONDITION>MD5=89217EED9E0D7FBA1A6D84A4EFE4E670</CONDITION>
- <CONDITION>MD5=9AFE1289C9BE01510B971CB6E36FD9ED</CONDITION>
- <CONDITION>MD5=A7BBB718B816CCBE2ECD9E71E87AE2BC</CONDITION>
- <CONDITION>MD5=8D44A3E92920046773726D88B8EAF315</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>488</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TBSSAVER.SCR)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=be176c2571670f6d776909deb7f8c078</CONDITION>
- <CONDITION>MD5=d4a37eef4452e6147556a0b35b763270</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>489</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SPTSUPD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SPTSUPD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3f96f698c517a863f5281b30f4218aea</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>490</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ACSPROXYSTUB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ACSPROXYSTUB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=10b3f87e218b6fdd7b103d921b46ff14</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>491</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SENH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SENH.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b86752f41f2ff6330f9d4f2ded63f482</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>492</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WEBR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WEBR.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=156441d5a49e14bf7e4662b4c353fb4b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>493</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RUN.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>RUN.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=efd9ab226787b2a42332b0c9e20b1b1e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>494</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(STUBBUNDLETC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>STUBBUNDLETC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=daa822563f564be36ea16baf6e7fb9db</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>495</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ISTBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{5F1ABCDB-A875-46C1-8345-B72A4567E486}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.IST/ISTBar (Slotch Bar).Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>496</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SFBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A3FDD654-A057-4971-9844-4ED8E67DBBB8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.IST/SideFind.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>497</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>2_0_1BROWSERHELPER2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{83DE62E0-5805-11D8-9B25-00E04C60FAF2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (2_0_1BROWSERHELPER2.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>498</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>QMSKURLH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{38FC345A-9F47-22E9-8220-66557FF37944}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (QMSKURLH.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>499</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>INCFIN~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0199DF25-9820-4BD5-9FEE-5A765AB4371E}</CLSID>
- <CLSID>{0026AD90-C86F-4269-97F3-DAB4897C6D06}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.IncrediFind.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>500</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SRCHFST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{000277A3-7D84-406a-9799-D12A81594693}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Searchfst Class BHO (SRCHFST.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>501</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BITS IDLE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C5BB15B1-507B-E3BE-7D15-35F3E55042D1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Bits Idle.exe BHO (BITS IDLE.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>502</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BITS IDLE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9E78E017-CDA5-E7E6-2B2C-2E152185DA1D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Bits Idle.exe BHO (BITS IDLE.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>504</ID>
- <PROCESSLIST>
- <PROCESS>SEXCAMS_AU.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SexCams Dialer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>505</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CELZJHK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6DFA6B52-9312-5AE2-8226-65550DF6283C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (CELZJHK.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>506</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NSU2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{E8EAEB34-F7B5-4C55-87FF-720FAF53D841}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CSearchHelpIEExtension Object BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>507</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SYSTB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{69135BDE-5FDC-4B61-98AA-82AD2091BCCC}</CLSID>
- <CLSID>{E2BF1BF3-1FDB-4C93-8874-0B09E71C594C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Intelligent Explorer BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>508</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>RH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0421701D-CF13-4E70-ADF0-45A953E7CB8B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.SmartPops.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>509</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00041A26-7033-432C-94C7-6371DE343822}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Search-Exe.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>510</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(J9ESPRC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>J9ESPRC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=eb6a4356f202376780a420eb47864a76</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>511</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WDSKCTL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>IE Plugin Variant (WDSKCTL.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=cd074582eac0c9c7e1ad8f63ed1df03f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>513</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>JPSUTNV.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{33A83156-9142-0DB1-8726-65550DF62C6D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (JPSUTNV.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>514</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1C78AB3F-A857-482E-80C0-3A1E5238A565}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.iSearch.Toolbar/BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>515</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SSKBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CA0E28FA-1AFD-4C21-A8DC-70EB5BE2F076}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SurfSideKick 2 URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>516</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SSK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SurfSideKick 2 Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=baecf81d333166bdabe04c9cb865ec3e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>517</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SSKUPDATER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SurfSideKick 2 Updater Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0a32635efc9f0f9f3d5edfb91d625fec</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>518</ID>
- <PROCESSLIST>
- <PROCESS>CONSCORR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ConsCorr (Cliks) Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~conscorr</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>519</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CONSCORR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ConsCorr (Cliks) Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f89eab3d483b0fecfd3f946198807e09</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>520</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9368D063-44BE-49B9-BD14-BB9663FD38FC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Search-Exe.URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>521</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{002F4E27-B273-4FA5-ADFC-1FB9ED210B37}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Search-Exe.Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>523</ID>
- <PROCESSLIST>
- <PROCESS>LAUNCHURL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Launchurl</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~launchurl</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>524</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>nLite SS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5375d517b79eb873ce2e3ed379614821</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>525</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MMVIEW_101.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EBBD88E5-C372-469D-B4C5-1FE00352AB9B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FavoriteMan Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>526</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WEBREBATES_CDT_INSTALLSILENT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WebRebates Silent Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2b95da7faf63a18e29f94cf716bb171b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>527</ID>
- <PROCESSLIST>
- <PROCESS>WINADTOOLS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows Ad Tools</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>530</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NEM220.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000010-6F7D-442C-93E3-4A4827C2E4C8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Avenue Media/Internet Optimizer.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>529</ID>
- <PROCESSLIST>
- <PROCESS>WINRATCHET.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows Ad Tools</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>531</ID>
- <PROCESSLIST>
- <PROCESS>CXTPLS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Apropos Media/CxtPls.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Apropos</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>532</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AUTOUPDATE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Autoupdate.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0b491a091f3ca5a6ae78b106c16a8d31</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>534</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BCPC_C.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BCPC_C.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d4661870a11fd8575fe4d0e973b04f4b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>535</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BCRE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BCRE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a8307eccf24ec132edb8cbb586370922</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>536</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BCRE_INST.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BCRE_INST.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a37ea93e41fd898bdc288ffffe72d0f0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>537</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(XCLEAN.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>XCLEAN.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0c61c43704a14dbdd806dfe5326c4cd5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>538</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(XCPY1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>XCPY1.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=040ca770ed6ef612885c6b14d883c352</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>539</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>XML.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7CD20E91-1F31-41da-8379-479EA31DF969}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Flash Enhancer BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>540</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CXTPLS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{01C5BF6C-E699-4CD7-BEA1-786FA05C83AB}</CLSID>
- <CLSID>{016235BE-59D4-4CEB-ADD5-E2378282A1D9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Apropos Media/CxtPls.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>541</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EXPLORER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0c95b47e34657b50197651b3fd5ba722</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>542</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINUPDT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.WINUPDT</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=318a05beec571a4bc297b9456cc37089</CONDITION>
- <CONDITION>MD5=B6DBD6CBBFD55F036576D7CDAEE6436D</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>543</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINUPDTL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Second Thought.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c82d1497868bc659e3844fe92d6a8c6e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>544</ID>
- <PROCESSLIST>
- <PROCESS>TBSSAVER.SCR</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~WebSearch</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>545</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FOUQCOB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FOUQCOB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=959705073906328706fca7c77b6aca5c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>546</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WSEM302.DLL</PROCESS>
- <PROCESS>WSEM303.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8F4E5661-F99E-4B3E-8D85-0EA71C0748E4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>BHObj Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>547</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BAP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BAP.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=77fbabfa1f68464f34dbc1dc89799ed5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>548</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSMC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MSMC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7a7d8d99f8d4895dfba409b1e3fad844</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>549</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CHKDSK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a5252b830eee61ecf4cc198bbfe95ce9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>550</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUNDLE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BUNDLE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4a12f5cc77436d6286b04dc38c167b23</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>551</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SAHAGENT-RAZORMEDIA1001.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SAHAGENT-RAZORMEDIA1001.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d206cd15341d331b4ed28ae3ec18931e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>553</ID>
- <PROCESSLIST>
- <PROCESS>EBATESMOEMONEYMAKER.EXE</PROCESS>
- <PROCESS>EBATESMOEMONEYMAKER0.EXE</PROCESS>
- <PROCESS>EBATESMOEMONEYMAKER1.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Ebates Moe Money Maker Processes</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>554</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DISP350.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Ebates Moe Money Maker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=544a232da8062f34a3809de09413aea9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>555</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EBMM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Ebates Moe Money Maker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=eeaafca92d0610a143b8bf80151c226a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>557</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FILUI2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FILUI2.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c9043f2e1692a47de11233d819122f58</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>558</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FLDOREE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FLDOREE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=919bec862559f68275e21c7760c5ce50</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>559</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MULTIMPP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{002EB272-2590-4693-B166-FBD5D9B6FEA6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MultiMPPObj Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>560</ID>
- <PROCESSLIST>
- <PROCESS>RXTOOLBAR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>RX Toolbar Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>561</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>RXTOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{25D8BACF-3DE2-4B48-AE22-D659B8D835B0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>RX Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>562</ID>
- <PROCESSLIST>
- <PROCESS>TVMUPDATER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TV Media Updater</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>563</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSA.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MSA.TMP</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=97f89d6e9cdb8ecab8a17724a70678e7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>564</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DEALHLPR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D848A3CA-0BFB-4DE0-BA9E-A57F0CCA1C13}</CLSID>
- </CLSIDLIST>
- <SUMMARY>DealHelper BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>565</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>OEMJISEARCHPLUS.DLL</PROCESS>
- <PROCESS>OEMJIPLS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D240DC29-C093-4388-B71F-A7103C796B0C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IEFriendly Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>566</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PBHELPER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4115122B-85FF-4DD3-9515-F075BEDE5EB5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>PBlockadeHelper Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>567</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>OEMJISEARCH.DLL</PROCESS>
- <PROCESS>OEMJISRC.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{804DB5C7-31E6-4885-850A-F1941B58A4C7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Oemji Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>568</ID>
- <PROCESSLIST>
- <PROCESS>OEMJIPOPUPBLOCKER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Oemji Popup Blocker Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>569</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ELITES~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{ED103D9F-3070-4580-AB1E-E5C179C1AE41}</CLSID>
- </CLSIDLIST>
- <SUMMARY>BHO Class (Elite Toolbar) BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>570</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ELITETOOLBAR VERSION 53.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{28CAEFF3-0F18-4036-B504-51D73BD81ABC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>EliteBar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>571</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ELITETOOLBAR VERSION 53.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{825CF5BD-8862-4430-B771-0C15C5CA8DEF}</CLSID>
- </CLSIDLIST>
- <SUMMARY>EliteBar IE Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>572</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HYPERBARSS3.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{C4CD839C-45F0-41FB-9E95-F045E59E3954}</CLSID>
- <CLSID>{5424EF59-CC3A-4D06-873B-0991D635D52B}</CLSID>
- <CLSID>{88466531-D118-435C-B5F9-F4A7688FFB28}</CLSID>
- <CLSID>{CA06E493-B768-41B2-A325-E941C8AAD377}</CLSID>
- <CLSID>{97AAEA65-E99D-4488-9E1D-3AE0985C273A}</CLSID>
- <CLSID>{AA7E619E-1DFE-4125-8DD2-68E867E9EDAB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>HyperSearchHook URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=99819BE463BE94E633B2F6F3CCA8BFF6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>573</ID>
- <PROCESSLIST>
- <PROCESS>WININIT32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Xabot Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>574</ID>
- <PROCESSLIST>
- <PROCESS>WINBAS12.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>575</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>QWYI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{38DD640D-9044-0AE5-D503-64550AFA734D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (QWYI.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>576</ID>
- <PROCESSLIST>
- <PROCESS>SP2CTR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Dluca-M Trojan Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>577</ID>
- <PROCESSLIST>
- <PROCESS>GLWJMGEB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Qsearch Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>578</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SEARCH3.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-A1F6-FC7EB590A97D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Search Bar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>579</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HELPER100.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{017C20C1-F86F-11D8-9B25-000ACD002AE3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (HELPER100.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>580</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>S4BAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{014DA6C1-189F-421a-88CD-07CFE51CFF10}</CLSID>
- </CLSIDLIST>
- <SUMMARY>My Search BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>581</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>S4BAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{014DA6C9-189F-421a-88CD-07CFE51CFF10}</CLSID>
- </CLSIDLIST>
- <SUMMARY>My Search Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>582</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~VirtualBouncer</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>583</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/AdDestroyer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~AdDestroyer</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>584</ID>
- <PROCESSLIST>
- <PROCESS>NSIAC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Qsearch Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TEMP</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>585</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ANTISPY.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ANTISPY.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e7f4f0c86667266177ebd11b6c75672e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>586</ID>
- <PROCESSLIST>
- <PROCESS>PRJTECT.EXE</PROCESS>
- <PROCESS>PRRTECT.EXE</PROCESS>
- <PROCESS>PRLTECT.EXE</PROCESS>
- <PROCESS>PRVTECT.EXE</PROCESS>
- <PROCESS>PRSTECT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PR*TECT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>587</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DSKFI1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DSKFI1.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8f34e0f26c1cc2604ba3029aa8a37eab</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>588</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DSQROPS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DSQROPS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3c15d82c3b5fad6692626388206cac45</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>589</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>EJGBLB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A4BE7BBA-EB30-4D73-A9B8-E6DBBC241537}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (EJGBLB.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>590</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SBCLE028.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D714A94F-123A-45CC-8F03-040BCAF82AD6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (SBCLE028.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>591</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MWSSRCAS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00A6FAF6-072E-44CF-8957-5838F569A31D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.MyWebSearch.URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>592</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>14302.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{941CA48C-3984-4E7D-AAF8-8755ED76EB50}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ngsh33.clsIS BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>593</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SFG412B.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{83B3E0C1-DEF1-4df5-A3F5-92D10B7A396A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SafeGuardProtect Object BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>594</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>POPUPANDSPYWAREADBLOCKER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{313ED77C-8A0C-4CCA-9594-B1F095F2A7B3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>PopupandSpywareAdBlocker.Class1 BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>595</ID>
- <PROCESSLIST>
- <PROCESS>ADPROT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ADPROT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>596</ID>
- <PROCESSLIST>
- <PROCESS>14302.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>14302.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>597</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>9Q5TL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A78860C8-EE1A-46DF-A97F-E3E6D433E80B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (9Q5TL.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>598</ID>
- <PROCESSLIST>
- <PROCESS>WINTASKAD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows TaskAd WINTASKAD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TASKAD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>599</ID>
- <PROCESSLIST>
- <PROCESS>WINSCHED.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows TaskAd WINSCHED.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TASKAD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>600</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(2UL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>2UL.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e70e89f89021fd3330194cd90c891309</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>602</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SETUP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2E65A557-173C-4DE9-860B-28FC5CACA542}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Setup.Setup1 BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>603</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>STLBDIST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2CF0B992-5EEB-4143-99C0-5297EF71F443}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Search Toolbar BHO Object BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>604</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IPSYSDRV32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{13F90341-AD79-4A9F-9B57-0234675670D6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IPSysDrv32 Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>605</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>INETP60.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{087173EF-9829-4F49-8340-A524177D3F60}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CBho404 Object BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>606</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>STLBDIST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2CF0B992-5EEB-4143-99C0-5297EF71F444}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Search/BrowserAid Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>607</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SDKRH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A97C0AE7-B4EF-5E62-D831-7DD175E72CE4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO/URL Search Hook (SDKRH.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>608</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TARA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TARA.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fe5e0fcb755b65e8ce9a1f8b5119ee37</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>609</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CHKNTFS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e04be7a975ec5ae8f2962e967c2b7c9b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>610</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LMF32V.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6A6E50DC-BFA8-4B40-AB1B-159E03E829FD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (LMF32V.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>611</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>YEFTAHV.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7F4A6895-8A7B-DBDC-0A31-FECACFD5CBED}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (YEFTAHV.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>612</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SEARCH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{BA2325ED-F9EB-4830-8FCE-0BC35B16969B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.WhenU.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>613</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SFSOETK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SFSOETK.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=299fc046646e2aa0280206d3ab1ad0cd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>614</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown rundll32 Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~.tmp</CONDITION>
- <CONDITION>COMMANDLINE~UMonitor</CONDITION>
- <CONDITION>COMMANDLINE~,</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>615</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUNDLEOUTER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ffab79c74e1f2213b1bab11714ebeb04</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>616</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BW2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7398423bd4395f00c6a85775d46d826c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>617</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WRAPPEROUTER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3efba5c539632c6e719b6b712f476170</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>619</ID>
- <PROCESSLIST>
- <PROCESS>SQUERYCCONTROL32.EXE</PROCESS>
- <PROCESS>SQUERYCLIENT32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SQuery</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>620</ID>
- <PROCESSLIST>
- <PROCESS>ADWARE-UPDATE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ADWARE-UPDATE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>621</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ADROAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{BDF6CE3D-F5C5-4462-9814-3C8EAC330CA8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>AdRoar Module Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>622</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TIRSRQPW.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C6031D0E-F86C-7214-F80D-26187AB53AF4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Toolbar (TIRSRQPW.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>623</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DMLSC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DMLSC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=344b6198103aa903bc7e176d67b68500</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>624</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NTOCATQ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NTOCATQ.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c11e5605b09aa7e06a9658f2a0f31872</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>625</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WAST2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WAST2.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3d66650a33753f94c82f2b28c8b16afc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>626</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MTWISYU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MTWISYU.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=59577508d29c4568d46c7865d2d2236d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>627</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TARA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TARA.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6d58a7358802ae0d9984a01419dd2103</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>628</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CTXAD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CTXAD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=821dcea702566f2c87ff8c2e9a8c3f63</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>629</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>QIMOQSOS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8FA2998E-266A-7B98-1B22-5FF07CCE3BB2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (QIMOQSOS.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>630</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TASKMGR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=38fa47a243f6e6f37e9ab06fd6f742b5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>631</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SSK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SurfSideKick 2 Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ebf1d7346705845b6cc20d47baeb022a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>632</ID>
- <PROCESSLIST>
- <PROCESS>ARUPDATE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>AdRoar Updater</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Ad Roar</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>633</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LOGONUI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b0a21e366827e22350d76d8a153bdc1b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>634</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OWYYW.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>OWYYW.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=299fc046646e2aa0280206d3ab1ad0cd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>635</ID>
- <PROCESSLIST>
- <PROCESS>BUNDLE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bundle Install</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~install</CONDITION>
- <CONDITION>PRODUCTNAME~install</CONDITION>
- <CONDITION>FILELOCATION~temp</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>636</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SAHAGENT-RAZORMEDIA1002.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SAHAGENT-RAZORMEDIA1002.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ae158da9c09accbd83b1d1d0ab790504</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>637</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NCASEP~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>n-CASE Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5c3d1c02455e35822fbb5942c748dec1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>638</ID>
- <PROCESSLIST>
- <PROCESS>WINCTLAD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINCTLAD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~ControlAd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>639</ID>
- <PROCESSLIST>
- <PROCESS>WINCTLADALT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINCTLADALT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~ControlAd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>641</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TargetSaver, Inc. Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~TargetSaver, Inc.</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>642</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TS2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TS2.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7dd0809d0704ad54eee6b1f87f313250</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>643</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TSM2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TSM2.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f9cbbdf62b43931463008b1433283893</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>644</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TSL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TSL.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6ed0b6ac55757b4e62fbc469c636e7b5</CONDITION>
- <CONDITION>MD5=207D13B63A094CB5BE21193423B48152</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>645</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SEARCH~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1D7E3B41-23CE-469B-BE1B-A64B877923E1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (SEARCH~1.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>646</ID>
- <PROCESSLIST>
- <PROCESS>BNDLWR_BUNDLE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BNDLWR_BUNDLE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~eAcceleration</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>647</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PXELRU.DAT</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8109AF33-6949-4833-8881-43DCC232B7B2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CATLEvents Object BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>648</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>RUNDLL16.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{80672997-D58C-4190-9843-C6C61AF8FE97}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IAdvertisementBHO Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>649</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ODJ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6D8D420F-E73C-1BF0-DB22-61550FDD281B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (ODJ.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>650</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>GSIM.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-DFF7-EC6BF4D5FA7D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>GSIM BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>651</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>STLB2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{12EE7A5E-0674-42f9-A76A-000000004D00}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SearchToolbarBHOObject BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>652</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINHOT32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{086CEFD5-A88D-4981-8915-D51F04360ED1}</CLSID>
- <CLSID>{8B224779-3B0E-4FEA-8AE1-B66C20DD840F}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ohb Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>653</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PERFECTNAVBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00D6A7E7-4A97-456f-848A-3B75BF7554D7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>PerfectNavBHO Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>654</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SEP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C5183ABC-EB6E-4E05-B8C9-500A16B6CF94}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Band Class BHO/Toolbar (SideSearch)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>655</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>STLB2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{12EE7A5E-0674-42f9-A76B-000000004D00}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Search Explorer Bar/Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>656</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DNSPROXY.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{06594350-D723-11D8-9669-0800200C9A66}</CLSID>
- <CLSID>{FF4E2C50-BCF3-47CF-952A-A512F5B5D0E8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>DNSProxy Module BHO - StickyPops.com</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>657</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SIKERNEL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0140DF95-9128-4053-AE72-F43F0CFCA062}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SIKERNEL.DLL BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>658</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>UEQCNBB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1F893F2C-B46D-01B2-8253-60557CF02A6B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (UEQCNBB.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>659</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>FGDK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{40D93524-EA38-51BE-D502-60557CF2733D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (FGDK.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>660</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>FCAJIF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0D70F311-3511-4918-9B0E-05F12D72A8B1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (FCAJIF.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>661</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VWRIKU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=61cfa0ded5666d451158c6f9a9a75854</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>662</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>_SUPERBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{136A9D1D-1F4B-43D4-8359-6F2382449255}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.SuperBar.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>663</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MZLDMD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MZLDMD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ae0febc55105501a84e13e70e2bc1d14</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>664</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EVSEYNQS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EVSEYNQS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6abc803c8be2a3f5c827285df0ed45d5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>665</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SLTE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SLTE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e1cf3c39d84778c2ebf86ad1e52d5d30</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>666</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LXYIYLED.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{57D25058-A0CD-FF9F-9FC9-0DBB75BE0036}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (LXYIYLED.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>667</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>EZISTMNG.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0813429C-FA2F-FEFC-0A46-FBCACFD79E9D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (EZISTMNG.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>668</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ESYN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CC378B83-9577-44D0-B4F8-0DD965E176FC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ESyndicate BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>669</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SFG_0C64.DLL</PROCESS>
- <PROCESS>SFG_7B82.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{564FFB73-9EEF-4969-92FA-5FC4A92E2C2A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SafeGuardProtect Object BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>670</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LOCATORS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{E720B458-B65A-438C-9FF3-B1DF65D7DB3E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Locators Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>671</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>1.02.05.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{5321E378-FFAD-4999-8C62-03CA8155F0B3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>672</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EXPLORER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS EXPLORER.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=922829fff074f620606047fd227a9ad3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>673</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EXPLORER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EXPLORER.EXE Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=35b2980034652904e18f453ea5f152db</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>674</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SERVICES.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SERVICES.EXE Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0f5650588b927f68f444e4d414a0b695</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>675</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RVICES~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=abb67b1a48f74deaa76b5771426266a9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>676</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IECUST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{06ABAA2D-34AB-4902-A326-409BD9B9A7A5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FreshBar Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>677</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LOPTCON.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D63F74E4-9487-A743-1E22-F8BC2BA6A8A4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>678</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SERVERSIDE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7FC56022-4EDA-472E-8830-7CA92CCBD025}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ServerSide BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>679</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>RCPIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{DB263009-466A-44C0-AFF6-C652204B3111}</CLSID>
- <CLSID>{6FF570CD-6E3C-4C88-A4D9-72E6F4C0A021}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (RCPIE.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>680</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(302.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>302.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9fe3959956a8f73170f84fd883faed0a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>681</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GETDNS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GETDNS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9d06dcd8165ff16f8a28bdcb94f7ba69</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>682</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PINGNET.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PINGNET.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=379f19bdbdb89b0d7590d17b422dcb0a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>683</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ODCFG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ODCFG.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1d5a68bbcf19dd61099ceeb1dd0ad0c2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>684</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>INSTAFIN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-DCF7-F96DA086B434}</CLSID>
- </CLSIDLIST>
- <SUMMARY>InstaFinder BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>689</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GJJ1YE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GJJ1YE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=cc1573eea9bf5464fd90ee2aa0195944</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>690</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(10MINSITE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>10MINSITE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f4f6b059fb8daa6fce1654f004504a1d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>691</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BW2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=56ca3c622ba84b6aab0286629eb0ef12</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>692</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SETUP_INCRED_6.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.IncrediFind.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bf8a832eb8028240b417a12cf25cc2d1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>693</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TIPB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.IncrediFind.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a1396f473eb29f86e0edd0f8f25f4db9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>694</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUNDLE~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8030c49a7b522c11cf12b9171d872055</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>695</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GLB2E.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=11f4fce437e9f567b9df81b5f520c08e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>696</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WRAPPEROUTER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7252339ab94c12d904be6c37ce229833</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>697</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GLB27.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ce01f4844442a4368339bdedbad4880d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>698</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~Ad Destroyer and Virtual Bouncer</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>699</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TEMP5343.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TEMP5343.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2c8ed7c49e6342fa684c088831e50cc4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>700</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PROT.EXE)</PROCESS>
- <PROCESS>(PROTAS.EXE)</PROCESS>
- <PROCESS>(KALVLFH32.EXE)</PROCESS>
- <PROCESS>(KALVTEO32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PROT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5c7c95ddcf329435332cdb859ca659ac</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>701</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SIDEBDD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SIDEBDD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=133329fa670554e10a6a4a7ccb6d18e4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>702</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MS29.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MS29.TMP</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bd52da3497274dd1bc4bae40bdced21d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>703</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CSH4TB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CSH4TB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9eba667157b036330b38b253529bd812</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>704</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSKCEO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00A0A40C-F432-4C59-BA11-B25D142C7AB7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>705</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSKHHE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0982868C-47F0-4EFB-A664-C7B0B1015808}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>706</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSEGGO.GIF</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{25F7FA20-3FC3-11D7-B487-00D05990014C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>707</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSJFBL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{94927A13-4AAA-476A-989D-392456427688}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>708</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSFAOL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CC916B4B-BE44-4026-A19D-8C74BBD23361}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>709</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSNKMI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>710</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(C_INST_1006.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>C_INST_1006.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c38f635af036d4347a8c325db6995b7f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>711</ID>
- <PROCESSLIST>
- <PROCESS>SSK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SurfSideKick 2 Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SurfSideKick</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>712</ID>
- <PROCESSLIST>
- <PROCESS>SSKUPDATER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SurfSideKick 2 Updater</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~Temp</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>713</ID>
- <PROCESSLIST>
- <PROCESS>WINSERVAD.EXE</PROCESS>
- <PROCESS>WINSERVSUIT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINSERVAD.EXE, WINSERVSUIT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~ServeAd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>714</ID>
- <PROCESSLIST>
- <PROCESS>SAHPACKAGE.EXE</PROCESS>
- <PROCESS>SAHPAC~1.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SAHPACKAGE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~temp</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>715</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DSKTRF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CB5B2BC6-F957-4D8A-BE67-83F3EC58BA01}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Begin2Search.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>716</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BTGRAB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000000-F09C-02B4-6EC2-AD0300000000}</CLSID>
- </CLSIDLIST>
- <SUMMARY>BTGrab BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>717</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EC.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EC.TMP</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9a64892a4e0715cffbeb769cbd8159e5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>718</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IEXPLORR11.DLL</PROCESS>
- <PROCESS>IEXPLORR22.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{BC0D2038-2DE5-4A6F-92BC-B18A3E0DE32A}</CLSID>
- <CLSID>{39AF31DD-EAFC-45EA-A56C-385B52E25CC0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Iexplorr BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>719</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>REDIRECTOR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D48F2E28-68E2-4920-9848-D6E6C7AB3EB7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Xupiter BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>720</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{702AD576-FDDB-4d0f-9811-A43252064684}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Xupiter Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>721</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IPINSIGT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{000004CC-E4FF-4F2C-BC30-DBEF0B983BC9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IPInsight BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>722</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>STOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0A5CF411-F0BF-4AF8-A2A4-8233F3109BED}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>723</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HTTPER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A5483501-070C-41DD-AF44-9BD8864B3015}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Httper BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>724</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ZIPCLIX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{319A68DB-06D0-46DA-9F93-A810D5A70836}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Zipclix Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>725</ID>
- <PROCESSLIST>
- <PROCESS>ERRORGUARD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Error Guard</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~ERRORGUARD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>726</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SATMAT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.BetterInternet.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~abetterinternet</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>745</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NEWDOTNET6_38.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4A2AACF3-ADF6-11D5-98A9-00E018981B9E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Newdotnet BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>747</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MYSRCHAS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3D898C55-74CC-4B7C-B5F1-45913F368388}</CLSID>
- <CLSID>{04079851-5845-4DEA-848C-3ECD647AA554}</CLSID>
- </CLSIDLIST>
- <SUMMARY>My Way Search Assistant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>748</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ENHTB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0007522A-2297-43C1-8EB1-C90B0FF20DA5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>wbho2 Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>749</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(07488.EXE)</PROCESS>
- <PROCESS>(NGPW36.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>07488.EXE, NGPW36.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f7725e19c1fd07963af5ec234ed77202</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>750</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VKYRCQ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>VKYRCQ.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f24fe041d3e3344ba056c32d89e3f1d7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>780</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DOWNLO~1.DLL</PROCESS>
- <PROCESS>DOWNLOADHTML.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{51641EF3-8A7A-4D84-8659-B0911E947CC8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>AdBars BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>781</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KGHOST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{968BC8A3-7660-4B12-B2BF-3334775835E1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>KGInternal Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>782</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SERVERSIDE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7FC56022-4EDA-472E-8830-7CA92CCBD025}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SSInternal Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>783</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NETGUI~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{08F46458-D00F-4573-8EB3-A9A9E15503F8}</CLSID>
- <CLSID>{4E7BD74F-2B8D-469E-AB8C-E56FA49CA83A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Grip Toolbar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>784</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HE3BBCFF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{000E6ED5-E3FC-4c93-99E9-D38D2A9F9B09}</CLSID>
- <CLSID>{00000000-167B-41bc-95FF-86A07B14712C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>LZIO BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>785</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IELCAABE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000000-64C4-4a64-9767-895AB4921E41}</CLSID>
- </CLSIDLIST>
- <SUMMARY>LZIO BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>786</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WMCBAACA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000000-2565-4c5b-A455-A74C8A2247AB}</CLSID>
- <CLSID>{00000000-0000-41a3-98CF-00000000168B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>LZIO BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>787</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ICDDEFFF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000000-10D6-4e5f-8F7F-29B32C1C0FC4}</CLSID>
- <CLSID>{00000000-0000-0000-BFA1-D7EE6696B865}</CLSID>
- </CLSIDLIST>
- <SUMMARY>LZIO BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>788</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>GRIPCZ29.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-AB8C-E56FA49CA83A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Grip Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>789</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RUNDLL32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=db27ea68b38e0eb26bec887e1cf99241</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>790</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ELTNGB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ELTNGB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a3499316302cd7ddc8995bd7d83b86a6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>791</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(F6H.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>F6H.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5462b399b92acfa174d9a0958ec8210e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>792</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AMEE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0a944c8b87d4e9f05f7f4d950dc72c41</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>793</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BQP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B1F0D5D0-6C6F-3F93-3E06-62B35BEE0DC4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (BQP.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>794</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MIDADDLE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{e8eaeb34-f7b5-4c55-87ff-720faf53d841}</CLSID>
- </CLSIDLIST>
- <SUMMARY>midADdle BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>803</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GCNWFYOF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GCNWFYOF.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f34d240781be269e89f9d6243f30ff11</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>804</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AAAVICA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>AAAVICA.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6f26f9308d831e2ca04f8b2218bbef60</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>811</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TSEO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TSEO.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a4ac46496a550ad01e4504a1264e8dc4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>821</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MQSBAR.DLL</PROCESS>
- <PROCESS>MQSSRCAS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0E677221-E309-4341-81BD-3CC3018BF5B3}</CLSID>
- <CLSID>{04011C11-2F3B-44ed-977C-270CA669C6B2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MyQuickSearch BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>831</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SPEER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000026-8735-428D-B81F-DD098223B25F}</CLSID>
- </CLSIDLIST>
- <SUMMARY>sPeerObj Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>834</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MQSBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0E677229-E309-4341-81BD-3CC3018BF5B3}</CLSID>
- <CLSID>{82315A18-6CFB-44a7-BDFD-90E36537C252}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MyQuickSearch Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>987</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>X0FF.DLL</PROCESS>
- <PROCESS>X2FF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D319662B-D5BF-4538-ADF3-8D3E36362608}</CLSID>
- <CLSID>{AC109D01-32D6-4EB5-8300-D3C5EBAC7C83}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClearStream Accelerator BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>988</ID>
- <PROCESSLIST>
- <PROCESS>HOSTAK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Hostak</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SYSTEM</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>989</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CD1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CD1.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=28c58aef3ca87f3475afee7699212599</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>990</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(B.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>B.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a3cba9887eae326396c9fe3f699a0077</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>991</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DKIEKWJAA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DKIEKWJAA.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5124637ecf329793b1e69a9a89c6a041</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>992</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OWO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>OWO.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f6d03f87c912be45853adef68067caf2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>993</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(YTMCR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>YTMCR.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=da5aa729df045362e34dd35fade9940a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>994</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OBQHZIBI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>OBQHZIBI.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4645dc4135a64257bb80f6c71466438f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>995</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>XBRRG.DLL</PROCESS>
- <PROCESS>ZNCS.DLL</PROCESS>
- <PROCESS>ANDYAZPST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9B67FE01-91FF-40DA-BEA5-BE15540B88DF}</CLSID>
- <CLSID>{ACF4BDFC-82ED-4B22-805B-2BFE1C366575}</CLSID>
- <CLSID>{D7521339-2CD0-404D-842F-B68CA74931B2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.JimmyHelp.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>996</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GBFGHVMV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GBFGHVMV.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=823603ae2568dc09ac8bd3a045b58db4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>997</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SVCHOST.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7c614899662db97c8326a1ed5954e0f8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>998</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TARA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TARA.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=138b7408caaa5f4f6c0a14268f9729b3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>999</ID>
- <PROCESSLIST>
- <PROCESS>ADMILLIKEEP.EXE</PROCESS>
- <PROCESS>ADMILLISERV.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Admilli Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1000</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>UMonitor entry point adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~,UMonitor</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1001</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ak-networks.com (AKCORE.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~akcore.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1027</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINSPOOL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4a4e629a25c77f9d038012405b3730d0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1028</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ak-networks.com (AKUPD.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~akupd.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1029</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(APPSETUP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>APPSETUP.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ce8bce9536a9ff175e2a092ca3fb5b09</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1030</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ak-networks.com (AKLSP.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~aklsp.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1031</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ak-networks.com (AKRULES.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~akrules.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1061</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EXPLORER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS EXPLORER.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=722c7df3239779698fc1cdcf2ca7ea89</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1073</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>GREY ISO.EXE</PROCESS>
- <PROCESS>EGGSIDOL.EXE</PROCESS>
- <PROCESS>SIGN MESS.EXE</PROCESS>
- <PROCESS>COOLOOZE.EXE</PROCESS>
- <PROCESS>PROGRAMBALM.EXE</PROCESS>
- <PROCESS>BITS 4.EXE</PROCESS>
- <PROCESS>LOCKSLINK.EXE</PROCESS>
- <PROCESS>DATAREAL.EXE</PROCESS>
- <PROCESS>MESSSTYLE.EXE</PROCESS>
- <PROCESS>GREATAIM.EXE</PROCESS>
- <PROCESS>INTRA DRV.EXE</PROCESS>
- <PROCESS>GREAT EXTRA.EXE</PROCESS>
- <PROCESS>CREATIVE LITE.EXE</PROCESS>
- <PROCESS>ROAM ROAD.EXE</PROCESS>
- <PROCESS>LIST BIAS.EXE</PROCESS>
- <PROCESS>KNOBPLAN.EXE</PROCESS>
- <PROCESS>MAIL UPLOAD.DLL</PROCESS>
- <PROCESS>SETTINGSPLUS.EXE</PROCESS>
- <PROCESS>MEAL OPEN.EXE</PROCESS>
- <PROCESS>BALM JUNK.EXE</PROCESS>
- <PROCESS>NAME FIRST.EXE</PROCESS>
- <PROCESS>DATA LOVE.EXE</PROCESS>
- <PROCESS>ARMYWARN.EXE</PROCESS>
- <PROCESS>BOWS AMEN.EXE</PROCESS>
- <PROCESS>AMEN FRAG.EXE</PROCESS>
- <PROCESS>SOFTWARE MEOW.EXE</PROCESS>
- <PROCESS>DRAW PLATFORM.EXE</PROCESS>
- <PROCESS>ONLINE PART.EXE</PROCESS>
- <PROCESS>ANTIEACH.EXE</PROCESS>
- <PROCESS>BARBPILE.EXE</PROCESS>
- <PROCESS>DEADMETA.EXE</PROCESS>
- <PROCESS>MODE AXIS.EXE</PROCESS>
- <PROCESS>DOWNLOADSKIP.EXE</PROCESS>
- <PROCESS>01 BORE.EXE</PROCESS>
- <PROCESS>BIRD32.EXE</PROCESS>
- <PROCESS>COMPHECK.EXE</PROCESS>
- <PROCESS>CASHMEAL.EXE</PROCESS>
- <PROCESS>BIAS BARB.EXE</PROCESS>
- <PROCESS>FREE FIVE.EXE</PROCESS>
- <PROCESS>COPY OKAY.EXE</PROCESS>
- <PROCESS>DENT ITCH.EXE</PROCESS>
- <PROCESS>01MATH.EXE</PROCESS>
- <PROCESS>KEEPDEAF.EXE</PROCESS>
- <PROCESS>AUDIOBIND.EXE</PROCESS>
- <PROCESS>NAMEPOP.EXE</PROCESS>
- <PROCESS>PEAKGLUE.EXE</PROCESS>
- <PROCESS>DENT CAST.EXE</PROCESS>
- <PROCESS>OKAYITCH.EXE</PROCESS>
- <PROCESS>LICENSE SIZE.EXE</PROCESS>
- <PROCESS>LISTWAVE.EXE</PROCESS>
- <PROCESS>LOAD BOOB.EXE</PROCESS>
- <PROCESS>MESSHOPE.EXE</PROCESS>
- <PROCESS>INTRAADMIN.EXE</PROCESS>
- <PROCESS>THIRD BLAH.EXE</PROCESS>
- <PROCESS>CASHRECT.EXE</PROCESS>
- <PROCESS>BIRD FIVE.EXE</PROCESS>
- <PROCESS>TYPE WAY.EXE</PROCESS>
- <PROCESS>OOZETWO.EXE</PROCESS>
- <PROCESS>4LOCKS.EXE</PROCESS>
- <PROCESS>4 ACTIVE.EXE</PROCESS>
- <PROCESS>BIASLICENSE.EXE</PROCESS>
- <PROCESS>BIBBLEH.EXE</PROCESS>
- <PROCESS>BLAH WAVE.EXE</PROCESS>
- <PROCESS>BOOK VC.EXE</PROCESS>
- <PROCESS>BROWSE TEAM.EXE</PROCESS>
- <PROCESS>CAMP INTERNET.EXE</PROCESS>
- <PROCESS>CITY BASE.EXE</PROCESS>
- <PROCESS>CITY COOL.EXE</PROCESS>
- <PROCESS>CITY TEAM.EXE</PROCESS>
- <PROCESS>CLOCKJOY.EXE</PROCESS>
- <PROCESS>COOL 2.EXE</PROCESS>
- <PROCESS>COPYMANAGER.EXE</PROCESS>
- <PROCESS>DART GLUE.EXE</PROCESS>
- <PROCESS>DEAF32.EXE</PROCESS>
- <PROCESS>DEFY BAT.EXE</PROCESS>
- <PROCESS>DOG EGGS.EXE</PROCESS>
- <PROCESS>DRAW BASH.EXE</PROCESS>
- <PROCESS>DRVLIVE.EXE</PROCESS>
- <PROCESS>DVD CITY.EXE</PROCESS>
- <PROCESS>EGGS MORE.EXE</PROCESS>
- <PROCESS>ERRORSPAM.EXE</PROCESS>
- <PROCESS>FASTFOUR.EXE</PROCESS>
- <PROCESS>FIRST JUGS.EXE</PROCESS>
- <PROCESS>FIVEACID.EXE</PROCESS>
- <PROCESS>SKIP PLAN.EXE</PROCESS>
- <PROCESS>BORE BUILD.EXE</PROCESS>
- <PROCESS>FORD TRAY.EXE</PROCESS>
- <PROCESS>FREE LONG.EXE</PROCESS>
- <PROCESS>GPL NURB.EXE</PROCESS>
- <PROCESS>GREYHIDE.EXE</PROCESS>
- <PROCESS>GRID MAGS.EXE</PROCESS>
- <PROCESS>GRID WINDOW.EXE</PROCESS>
- <PROCESS>IDLEANTI.EXE</PROCESS>
- <PROCESS>ITCH BODY.EXE</PROCESS>
- <PROCESS>ITCHNOUN.EXE</PROCESS>
- <PROCESS>MEDIACLOCK.EXE</PROCESS>
- <PROCESS>OKAY DART.EXE</PROCESS>
- <PROCESS>MEDIA SHOW.EXE</PROCESS>
- <PROCESS>TIMESAFE.EXE</PROCESS>
- <PROCESS>EXIT HTM.EXE</PROCESS>
- <PROCESS>FLAW UPLOAD.EXE</PROCESS>
- <PROCESS>GREAT BALL.EXE</PROCESS>
- <PROCESS>BIASGLOBAL.EXE</PROCESS>
- <PROCESS>LINKTEST.EXE</PROCESS>
- <PROCESS>BROWSE CASH.EXE</PROCESS>
- <PROCESS>4 HECK.EXE</PROCESS>
- <PROCESS>REFSTORE.EXE</PROCESS>
- <PROCESS>ABOUT DEAF.EXE</PROCESS>
- <PROCESS>BAT ACID.EXE</PROCESS>
- <PROCESS>INTRA ERROR.EXE</PROCESS>
- <PROCESS>SUPPORT BASH.EXE</PROCESS>
- <PROCESS>AIM OPTION.EXE</PROCESS>
- <PROCESS>CRYPTDLCG.DLL</PROCESS>
- <PROCESS>TRAY ROAD.EXE</PROCESS>
- <PROCESS>GRIDBOLT.EXE</PROCESS>
- <PROCESS>GRID BIND.EXE</PROCESS>
- <PROCESS>GRAMBIB.EXE</PROCESS>
- <PROCESS>VC SAFE.EXE</PROCESS>
- <PROCESS>NEWTRAY.EXE</PROCESS>
- <PROCESS>ACTIVEBAIT.EXE</PROCESS>
- <PROCESS>CAMPHOPE.EXE</PROCESS>
- <PROCESS>DARTPOLL.EXE</PROCESS>
- <PROCESS>ACTIVE RECT.EXE</PROCESS>
- <PROCESS>FIRST FOUR.EXE</PROCESS>
- <PROCESS>ONLINE MATH.EXE</PROCESS>
- <PROCESS>LESS DEFAULT.EXE</PROCESS>
- <PROCESS>SHOW ACE.EXE</PROCESS>
- <PROCESS>KEEP DOG.EXE</PROCESS>
- <PROCESS>BARBJUNK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{80D86BC0-C393-A405-D9C1-B821C95589C9}</CLSID>
- <CLSID>{0AE1A61E-B26C-F7A8-4E6D-659486115F7E}</CLSID>
- <CLSID>{6EDD829D-E0CB-E13C-BC93-5674A0080ECF}</CLSID>
- <CLSID>{E0152A3D-4520-D5F4-0220-B367324C5572}</CLSID>
- <CLSID>{1110E7DB-F4D6-A566-AAA3-2B402E2D8FCA}</CLSID>
- <CLSID>{D54694A4-EEAC-9B8A-E6A5-E795068FC855}</CLSID>
- <CLSID>{A89BB706-7E6E-6B1F-E5DB-94C70BF04059}</CLSID>
- <CLSID>{1CF8B8BE-E3B9-56DE-1F6A-1E04AA88652B}</CLSID>
- <CLSID>{1A8618A7-351F-7445-76FE-062EB06C4519}</CLSID>
- <CLSID>{4145ED01-A8C1-701D-20C7-1DC874B9DDD5}</CLSID>
- <CLSID>{9DE052B9-BD4B-561C-7BDE-2F8146866A03}</CLSID>
- <CLSID>{9739C85A-FCB0-8702-70CD-FC0581C57331}</CLSID>
- <CLSID>{6F7CDEE1-EB51-EA0F-3625-8D7DC2107F9D}</CLSID>
- <CLSID>{60212D4C-55A5-7A17-2653-F5A7F80AF83B}</CLSID>
- <CLSID>{9BE5B5E5-9DED-3548-DC05-872A2A5EDBEE}</CLSID>
- <CLSID>{1EE61FBE-4E29-30FD-8429-FDEAC48CD272}</CLSID>
- <CLSID>{3E0B9D4B-48A8-E9C6-1419-39B515BE751C}</CLSID>
- <CLSID>{24C3C7CA-F370-8C26-CC61-93603E85FFD5}</CLSID>
- <CLSID>{20D375DE-4664-040E-1280-0666279205B6}</CLSID>
- <CLSID>{B16FEA72-86E5-ADCD-E142-BF6ED481C270}</CLSID>
- <CLSID>{94DEA2AF-55B5-CB69-0D6E-FA5CF343415D}</CLSID>
- <CLSID>{5D6F65F0-D622-3D45-2D7B-CDBA8199CC6E}</CLSID>
- <CLSID>{F3E8A594-8AF8-B202-B4D4-3E658BF85B05}</CLSID>
- <CLSID>{6A7239AC-64A4-AC16-35DF-96087FD53CD9}</CLSID>
- <CLSID>{B43B67E0-A691-81C7-A846-90937A3CA55A}</CLSID>
- <CLSID>{DC22DE78-0DE4-F158-1736-4B485576FABE}</CLSID>
- <CLSID>{F7A3D361-48FD-0BE4-31EB-A804409FB5D0}</CLSID>
- <CLSID>{3B50A387-656E-F8BF-710E-70DB6D8F6FF6}</CLSID>
- <CLSID>{BFA80735-95F9-0E84-21BD-7D64C298CA45}</CLSID>
- <CLSID>{5796D2BA-CC2E-5FFC-5212-127922A52A74}</CLSID>
- <CLSID>{80E8CEBA-553E-F82C-8ED6-5BC74C9F025E}</CLSID>
- <CLSID>{06CFDA73-9F94-18F2-9E59-C8C2661DCE98}</CLSID>
- <CLSID>{E3FDF4C0-D234-6A7A-F040-4E2C0661EE7F}</CLSID>
- <CLSID>{D33FFAF3-099D-6BA1-6987-9FAB37CF5E7F}</CLSID>
- <CLSID>{E3F598FB-BB74-BB4D-9D07-1146E78AB92C}</CLSID>
- <CLSID>{A7EF35B2-D41F-5EAB-9949-C94D1FE0A719}</CLSID>
- <CLSID>{E018625B-F2A4-CA17-AADD-DE40D80459D4}</CLSID>
- <CLSID>{164101C4-04C4-142B-9111-BA9BA04E418F}</CLSID>
- <CLSID>{774C3D6B-A96A-AD6C-34D0-AEF416C1039B}</CLSID>
- <CLSID>{0DC8EEAF-2287-B130-FDE7-93E488DF722C}</CLSID>
- <CLSID>{03313C4A-2D88-C00D-C356-9407AB7541EC}</CLSID>
- <CLSID>{FEF7C71A-D2E7-B0B0-0ADB-0CD57DCFE6F8}</CLSID>
- <CLSID>{DCF9EF90-DB3F-1258-F2E0-F751CD48121A}</CLSID>
- <CLSID>{791E0B10-A45F-920D-AAA1-23D212F0B6F0}</CLSID>
- <CLSID>{D2A01AEB-A4B7-5E2B-DE83-A19C292D3490}</CLSID>
- <CLSID>{4F0AECD4-8D50-7A92-D05B-0909E89D67AC}</CLSID>
- <CLSID>{E8FABDCD-AB23-0A21-D16B-EDB3A9EF84FA}</CLSID>
- <CLSID>{8093FE44-6F17-FEBF-F841-1063EB58664D}</CLSID>
- <CLSID>{7F3DF6D2-F075-3E40-EC25-6534D0BC17A1}</CLSID>
- <CLSID>{24FE0374-6DAB-3A18-BA1C-7ED214698F6D}</CLSID>
- <CLSID>{AB19C479-6ADB-1497-51BE-B8E10E013E01}</CLSID>
- <CLSID>{6A51749B-FB89-142E-267A-68406354B916}</CLSID>
- <CLSID>{6075DDA7-EC77-9D3B-D6B7-55E749F1F0CF}</CLSID>
- <CLSID>{3BB62801-71A9-9963-808E-4E018D246803}</CLSID>
- <CLSID>{D0C080ED-F93F-7724-2C6D-631395DFE366}</CLSID>
- <CLSID>{26723C03-FB50-17CB-35F3-DF4A8AC99388}</CLSID>
- <CLSID>{04C0E57D-76C3-DA8E-1318-F8756547DFB0}</CLSID>
- <CLSID>{7F8CB6F3-879C-BE70-6944-735C438F4CEA}</CLSID>
- <CLSID>{06AA4E09-0CA8-E2FC-8D23-5F4C16100088}</CLSID>
- <CLSID>{613DCFC1-EE57-2987-7C43-B2C678B5BD87}</CLSID>
- <CLSID>{1FA0A5EF-4BBB-72B5-B1E1-D657AC61D817}</CLSID>
- <CLSID>{AF1982F3-1161-D5B6-7FE3-D686971B1758}</CLSID>
- <CLSID>{B3D8AE77-061D-8307-7E5D-66E0092F74A8}</CLSID>
- <CLSID>{E81B5BD1-9BC3-875F-2864-7D06CDFAEC64}</CLSID>
- <CLSID>{C920F0AE-1BBD-8FE1-8F7A-BEE56D10BC37}</CLSID>
- <CLSID>{0F9997E3-E7F6-3CFF-A985-D26A849FFA65}</CLSID>
- <CLSID>{AAE42396-70A3-D8F2-389D-77C771B431F9}</CLSID>
- <CLSID>{48F4A7C1-E0D6-1B0D-B35E-D93BE7361B61}</CLSID>
- <CLSID>{C78150A4-747D-4E11-F07A-82FFA455B929}</CLSID>
- <CLSID>{86B5DDF4-9DC9-E2C4-BC7C-F805C04AA031}</CLSID>
- <CLSID>{66E98A3E-30B0-D5B7-31DB-EF35B9D63C1C}</CLSID>
- <CLSID>{24B643CF-48C3-207A-CBF7-3BB19D686B17}</CLSID>
- <CLSID>{3D7056C9-343D-B9AD-73AD-FB71CC469AC9}</CLSID>
- <CLSID>{672E86CC-B742-F9BA-0123-3D97935F2AB0}</CLSID>
- <CLSID>{BD723295-6FD8-4EDD-C89D-FCCFBF876A32}</CLSID>
- <CLSID>{807150EE-29D5-D253-0332-A6335794F519}</CLSID>
- <CLSID>{DBB2A548-B40B-D60B-550B-BDD593416DD5}</CLSID>
- <CLSID>{C3A071ED-CEC5-12C9-F880-7714D2D85651}</CLSID>
- <CLSID>{EED8EBDC-24BE-68EB-5FBD-CA5993135B14}</CLSID>
- <CLSID>{42113D05-F3F7-C971-6311-6C7B79FE985B}</CLSID>
- <CLSID>{BB0EEA07-0E19-F2E8-733F-B1E08BB70CE1}</CLSID>
- <CLSID>{7465A5E9-71F0-F8AA-38E9-55C83D904B46}</CLSID>
- <CLSID>{5B989A20-F3AB-12B9-535E-45B0E28BB52B}</CLSID>
- <CLSID>{3A219E3B-31F3-515D-4687-BDF4C21F9105}</CLSID>
- <CLSID>{61E26B9D-AC2D-5505-10BE-A61206CA09C9}</CLSID>
- <CLSID>{EDB96B1B-FCC6-0C97-D1A8-2F70C3840419}</CLSID>
- <CLSID>{4A80D87F-D2DF-EB77-B3DC-9B44D81B4269}</CLSID>
- <CLSID>{92086129-0CED-5AF6-3AD0-0B530FB6566B}</CLSID>
- <CLSID>{1BD24045-B6E4-0111-0915-E8339B403BF9}</CLSID>
- <CLSID>{AB1DEDC2-ED1A-2FC1-E04A-6D7AFBE6E75E}</CLSID>
- <CLSID>{0E3D5D3E-F5F2-297B-6B46-59E49D978874}</CLSID>
- <CLSID>{E305F398-BED6-1BF7-ABBE-9342141C0CDF}</CLSID>
- <CLSID>{B8C6063E-2308-1FAF-FD87-88A4D0C99413}</CLSID>
- <CLSID>{A0081F37-A095-0B49-91CD-EF5FE8EC42AD}</CLSID>
- <CLSID>{C1DAA4A4-136A-634B-6A68-9B45A40B9F26}</CLSID>
- <CLSID>{B3FC7CCB-69DA-C58E-ABE8-F1B8845A63C7}</CLSID>
- <CLSID>{1169E893-4367-6E73-29C3-F1498D237BB0}</CLSID>
- <CLSID>{45CD1281-5C16-39DB-55FC-361053F3A60C}</CLSID>
- <CLSID>{55263654-7323-42F1-25A3-3F9DB22CF055}</CLSID>
- <CLSID>{6E377F7B-9F73-58EB-EAC2-62DBA72B2668}</CLSID>
- <CLSID>{AA2781A0-1718-E6A6-6D20-485C5EBD0621}</CLSID>
- <CLSID>{D106256F-6E04-E755-4BBB-089CF59D23FB}</CLSID>
- <CLSID>{708CAA54-9631-EA2E-6C26-C691980BA8E8}</CLSID>
- <CLSID>{757FC12B-CC6D-0663-5152-DE9B8C984221}</CLSID>
- <CLSID>{D527329F-30C1-7E8E-486E-1CDB7639A95D}</CLSID>
- <CLSID>{BFE37C09-837E-8800-2FC0-89B9E867CB74}</CLSID>
- <CLSID>{3DEA8E1B-7333-3C38-CFC8-AF860E64A6D9}</CLSID>
- <CLSID>{94F88260-2B7B-AF41-5CCE-B9EE8A8D66FF}</CLSID>
- <CLSID>{B67227D9-AD1F-5F47-B1BD-ADF8FEEBC8FA}</CLSID>
- <CLSID>{A1E2C02F-CADA-B5D5-71E6-C54C8D144DD5}</CLSID>
- <CLSID>{B6253C12-DD6B-0E7A-C7FD-ED75D3184927}</CLSID>
- <CLSID>{16A0187C-80D1-C1A8-519F-DB77B6B6DD55}</CLSID>
- <CLSID>{5FFD6C0D-5F66-F2F5-EECB-EE493CA9E540}</CLSID>
- <CLSID>{757526CA-BE5D-8248-67DF-BAD28346BF6B}</CLSID>
- <CLSID>{3A0C5D74-A3F1-7493-BF9C-7C64D05283BE}</CLSID>
- <CLSID>{E28E8336-B340-FA11-88C2-F0B1039192B3}</CLSID>
- <CLSID>{B94D7690-2E9E-FE49-DEFB-EB57C7440A7F}</CLSID>
- <CLSID>{5E61504A-1FBD-D45E-03F7-B5107152B28F}</CLSID>
- <CLSID>{5702DD37-4A0E-C54F-4624-93F0672EDECA}</CLSID>
- <CLSID>{D62510E4-4174-A2F9-7F51-FA37D47797EC}</CLSID>
- <CLSID>{9386A64E-F92F-C8C7-558B-D952B72832EA}</CLSID>
- <CLSID>{8DC6084A-A278-4321-A75B-C26A902FC414}</CLSID>
- <CLSID>{A7E64158-614E-C9C1-5BDC-1C5D300EC5F5}</CLSID>
- <CLSID>{6A38CE8D-AA5F-E41E-6AFD-CF70A2DDD761}</CLSID>
- <CLSID>{31FB3B2B-3781-E046-3CC4-D49666084FAD}</CLSID>
- <CLSID>{217EF8FF-FEC2-4D14-2637-2314F82F3419}</CLSID>
- <CLSID>{2FE800D9-0B41-D389-AEF2-8B6E2E6368B1}</CLSID>
- <CLSID>{2133536A-BD02-C684-850B-EB694834CF8B}</CLSID>
- <CLSID>{6C99D30F-31D9-18BC-4AD8-BFBB3572273D}</CLSID>
- <CLSID>{124BB45B-D75B-6014-3F78-24C2867056AE}</CLSID>
- <CLSID>{848B5B81-C0D2-0F84-5B85-32914FDAD678}</CLSID>
- <CLSID>{DE8AB01F-0C4F-6D9D-5498-8B536A9A4B6B}</CLSID>
- <CLSID>{854945B9-9191-69C5-02A1-90B5AE4FD3A7}</CLSID>
- <CLSID>{C3AB8038-1CD5-46C6-0732-4690F23DAE88}</CLSID>
- <CLSID>{91D6F41C-3499-C806-356B-4A301E9B3171}</CLSID>
- <CLSID>{D1CE5C5A-FBA3-A6A4-F5A1-E0D73FE43145}</CLSID>
- <CLSID>{7527181B-52D0-31A5-F4F1-B792F158FE5B}</CLSID>
- <CLSID>{0B7CFBA7-387C-EB7D-C6BE-9B7FB2B431B4}</CLSID>
- <CLSID>{B55A274E-762D-75CC-711B-DE31526CF198}</CLSID>
- <CLSID>{309DA5DB-7456-A67F-3C5A-A8EE4B814AC8}</CLSID>
- <CLSID>{C7F2F8D3-B506-CFF6-073C-DD5997A617A5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1074</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BYTE INFO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e7822adc283a8936c60370fe7909670e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1077</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>JFLJ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{86DE3D06-3589-4157-847B-88330C217AFA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (JFLJ.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1078</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSZ{.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8E7BE188-29A1-40CF-ABF2-9B2E0E28A374}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (MSZ{.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1079</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(302.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>302.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=77d24642c055e6097b5095a62b22382c</CONDITION>
- <CONDITION>MD5=8DC7A533A845F36064A337E4B1FE2455</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1080</ID>
- <PROCESSLIST>
- <PROCESS>NLSFUNCS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NLSFUNCS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1081</ID>
- <PROCESSLIST>
- <PROCESS>OPENCONF.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>OPENCONF.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1132</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FUNK THE.EXE)</PROCESS>
- <PROCESS>(QDWNPKTD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d3742a85243f05545333e8ae6c99e0ab</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1133</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OPTION LINK DEAF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=40d0a6049c134403d5b7ea9cd40a53ab</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1134</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KJYHEASG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=82b06b5bdcb55099b799e9cfeca16322</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1169</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WAYYYQ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WAYYYQ.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=dbcfc9cbc43dbeefaa5ab576467fd186</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1170</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OPTION LINK DEAF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=109b71a6f978260b771c6f0344326a99</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1171</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ANTE IDLE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b70a89a7d3ab992b398999ce9424a4dd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1172</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SURFAX~1.EXE)</PROCESS>
- <PROCESS>(LUWZTYIJ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=850a7e50be74f2ae0bdef4c41d949604</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1173</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BIS2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=945937c0c93af47f6ccd34eb2edb60ca</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1174</ID>
- <PROCESSLIST>
- <PROCESS>SETUP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~c2media</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1175</ID>
- <PROCESSLIST>
- <PROCESS>MCSMSS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MCSMSS.EXE HTTP Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1176</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VVJCF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>VVJCF.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=535275aa4e2500702bddb1f2377e1764</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1253</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LKHI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7D6C6229-EAB7-47E2-8289-64A367D85D7C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (LKHI.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1260</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KW9OBKRL6I.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CE7C3CF0-4B15-11D1-ABED-709549C10020}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IEHlprObj Class BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1261</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINS32T.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FDE3577A-6254-181C-4E11-339E4F746BD3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MailTo Class URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1262</ID>
- <PROCESSLIST>
- <PROCESS>SCANDS32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SCANDS32.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~win</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1263</ID>
- <PROCESSLIST>
- <PROCESS>HBHOSTIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FF6B2FD5-093C-4D4F-BB98-5641130A9DE6}</CLSID>
- <CLSID>{B195B3B3-8A05-11D3-97A4-0004ACA6948E}</CLSID>
- <CLSID>{BECAFC17-BAF9-11D4-B492-00D0B77F0A6D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar.Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1264</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(XHRMY.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>XHRMY.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e58e15f7301e37924ba29d5a20a4c058</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1281</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WEBDIR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C003C49F-53E4-4A72-B7D6-0B2B9997392F}</CLSID>
- </CLSIDLIST>
- <SUMMARY>WEBDIR.DLL BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1280</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IETLBASS32.DLL</PROCESS>
- <PROCESS>SEHLP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4C1B116F-2860-46DB-8E6C-B4BFC4DFD683}</CLSID>
- <CLSID>{3BA765C2-08DB-4fe2-9279-311CA10D582A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>AnalyzeIE Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1282</ID>
- <PROCESSLIST>
- <PROCESS>LBBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- </CLSIDLIST>
- <SUMMARY>LBBHO.DLL BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1283</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SMRTSHPR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}</CLSID>
- <CLSID>{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar/ShopperReports.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1285</ID>
- <PROCESSLIST>
- <PROCESS>SUPLOADS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Suploads/Trin Downloader</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1303</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>FKAN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F933FAA4-30B1-4B32-9FE0-46C25FE627F4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (FKAN.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1323</ID>
- <PROCESSLIST>
- <PROCESS>BUDDY.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BUDDY.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Direct Revenue</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1329</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OQSZXN.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>OQSZXN.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5f758aad9a59235bbc9f2517801c359d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1331</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BODYELSE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4f8866ab2fec2a30404590949b2d7c79</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1332</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TEST BOWS ONCE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1df14d12e18b2af34344a73ec522bda5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1333</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(THEVGA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6bbef457685169aff634edc8c909f9da</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1335</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MULTIEXIT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3cea07a9197bf68f42118058725a0f4f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1339</ID>
- <PROCESSLIST>
- <PROCESS>LOOUD.EXE</PROCESS>
- <PROCESS>UN1OAD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Win SSV Virus</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1344</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PSQWIZPK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6bbef457685169aff634edc8c909f9da</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1351</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ELITESIDEBAR VERSION 8.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{BE8D0059-D24D-4919-B76F-99F4A2203647}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Elite SideBar Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1360</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>_SUPERBAR.DLL</PROCESS>
- <PROCESS>SUPERBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C53AA48A-AD2B-473B-B1C8-63FE5C2D39CA}</CLSID>
- <CLSID>{23D464EE-9CCC-4ABE-B289-848042A9BD6C}</CLSID>
- <CLSID>{41B1E420-62B8-4622-AFDD-568329D7BF18}</CLSID>
- <CLSID>{6C41218D-4F8E-46E0-B478-6A8A807EDCB2}</CLSID>
- <CLSID>{579B4F0C-BBE7-4F17-AD98-EB6D2E3B7EA0}</CLSID>
- <CLSID>{AB66367A-0822-4204-A5DB-A255C24E5BC1}</CLSID>
- <CLSID>{65557742-ABE3-4659-8049-5C6C7A3EA2E3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.SuperBar.Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1367</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ADMIN VC.EXE)</PROCESS>
- <PROCESS>(ADMINV~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=94a90ba71417dca1b1ef96f1fb191f9a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1368</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MP3CITYGPL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=57edf83a8d34606995248fd92270105f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1382</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KALVRVU32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Kalvsys (KALVRVU32.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=dd7f32d8545bc0aa60c456b6730d6700</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1467</ID>
- <PROCESSLIST>
- <PROCESS>MMUPS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Mmups/Trin Downloader</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~trin</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1471</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(9A718.EXE)</PROCESS>
- <PROCESS>(E76A7.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Random name adware process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=474cad8bd8ddd1b88c24b2e152cd0ded</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1472</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(QHSR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Random name adware process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=22efea56e1c5c005603abc511eb77756</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1480</ID>
- <PROCESSLIST>
- <PROCESS>MMWORK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Media-Motor Installer/Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~df</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1487</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SPOOLSV.EXE)</PROCESS>
- <PROCESS>(OOLSV~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3d43bc669b328f8e6e1e3c4ae0aa0630</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1488</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>FXT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3180A9B6-4720-1ED3-0233-3D3658EBFC93}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (FXT.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1489</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(APEV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Web Offer Module</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~Web Offer</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1490</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NIUT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Random name adware process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d068ef434338431622fa387eaa2681d7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1547</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{12F02779-6D88-4958-8AD3-83C12D86ADC7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>411Ferret Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1551</ID>
- <PROCESSLIST>
- <PROCESS>WEBCPR0.EXE</PROCESS>
- <PROCESS>WEBCPR1.EXE</PROCESS>
- <PROCESS>WCPRI.EXE</PROCESS>
- <PROCESS>WRGRCI.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Web_Cpr (WebRebates) Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1560</ID>
- <PROCESSLIST>
- <PROCESS>WSXSVC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.DelFin Project.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~wsxsvc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1561</ID>
- <PROCESSLIST>
- <PROCESS>VMSS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.DelFin Project.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~vmss</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1562</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SAVINGSHOUND.DLL</PROCESS>
- <PROCESS>SAVING~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{325338F0-AED0-45f6-A0DA-B5B09E6A07ED}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SavingsHound BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1563</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CDOFO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CDOFO.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c30b8281c4172fdad9658d2b024ff132</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1564</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CIPTPKI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CIPTPKI.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=843bb3fd07018f3a720987b0856c6cf6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1565</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(27.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>27.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fbfc24dd3730d7f95d392ff00e77aea7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1566</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BPT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.BroadcastPC.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ac429a4718a041a42f3f7d1978694192</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1581</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CERES.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000049-8F91-4D9C-9573-F016E7626484}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.BetterInternet.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1582</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>QUESTMOD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7B55BB05-0B4D-44fd-81A6-B136188F5DEB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Sa BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1583</ID>
- <PROCESSLIST>
- <PROCESS>BUDDY.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BUDDY.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~Ceres</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1584</ID>
- <PROCESSLIST>
- <PROCESS>BMULALME.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BMULALME.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1585</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSHTA.EXE)</PROCESS>
- <PROCESS>(MHTA~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ce46039fc89d7c4a355789cb0e5aa9c5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1586</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MIKSID.DAT</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{60112085-E1CE-4e0e-823A-EBB1AD98804C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>VMHook.dll BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1587</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ZSERV.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000000-C1EC-0345-6EC2-4D0300000000}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ZSERV.DLL BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1590</ID>
- <PROCESSLIST>
- <PROCESS>WJVIEW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EbatesMoeMoneyMaker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~EbatesMoeMoneyMaker</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1591</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SVCHEST.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVCHEST.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=204e849b57cf229dc3ac6e5e8b3c72aa</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1592</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GXGR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GXGR.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e9b955382b9a6f32d3566752eaa4838d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1593</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DKL49.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DKL49.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6457f8fc0ca474d90c851df79223afec</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1594</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINSPOOL.EXE)</PROCESS>
- <PROCESS>(WNSPOO~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=253c3938eeb6e8bfe0475368d751e72d</CONDITION>
- <CONDITION>MD5=51A509EB0149F6564BF49F10CBF4BCF6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1595</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WER1316.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CF021F40-3E14-23A5-CBA2-717765721316}</CLSID>
- </CLSIDLIST>
- <SUMMARY>WER1316.DLL BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1596</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KAQIA.DLL</PROCESS>
- <PROCESS>JFUISW.DLL</PROCESS>
- <PROCESS>OODLG.DLL</PROCESS>
- <PROCESS>RTGLAXHL.DLL</PROCESS>
- <PROCESS>JDYJSTES.DLL</PROCESS>
- <PROCESS>HZNJEL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{6B5FB33F-C0A0-4347-8AB1-E5C68E4F990C}</CLSID>
- <CLSID>{40BB637E-6BEE-49B1-84DF-12B39C751F5E}</CLSID>
- <CLSID>{697EFCEB-EC81-4581-B999-457A8D0604DC}</CLSID>
- <CLSID>{537C36F7-B119-4308-BCC3-92A5F8FCB564}</CLSID>
- <CLSID>{E1448633-546F-497A-9AB3-90653C10B26A}</CLSID>
- <CLSID>{7B4971B7-9F19-4069-9D96-D0275CD548AA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.tc Module.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>PRODUCTNAME~tc Module</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1597</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>QZTAXP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1FA3310B-9217-50CE-8003-64550DF47F45}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (QZTAXP.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1598</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WNIM.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B72F75B8-93F3-429D-B13E-660B206D897A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Troj/StartPa-DW BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1599</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SDKXM.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F491568F-994F-64FF-02BF-6D4779D6ED11}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (SDKXM.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1600</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>GXHIK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7EDDF4A3-2BCF-4269-8706-DD25C1761934}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (GXHIK.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1601</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OPEN LIES.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7ac46305b8f6070b63b848b0d9064864</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1602</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>GWSS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F0C08B30-BA30-4FEB-924B-2E250CF0697D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Begin2Search.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1603</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LMU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>LMU.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9ffb14082685fd5d0613d6f032eba8c5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1604</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>REPLACESEARCH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{832BEBED-C3DA-4534-A2C2-B2FFF220C820}</CLSID>
- </CLSIDLIST>
- <SUMMARY>replaceSearch Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1605</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SYSFIT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SYSFIT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f804aa7ed7d06ebddbe83505c52ae950</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1606</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NHELPER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C1E58A84-95B3-4630-B8C2-D06B77B7A0FC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>NavExcel/NavHelper BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1607</ID>
- <PROCESSLIST>
- <PROCESS>DR_S.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DR_S.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~DR_S</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1608</ID>
- <PROCESSLIST>
- <PROCESS>SYSSFITB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SYSSFITB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1609</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FNDGQN.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FNDGQN.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=57f1a80fd17e42806762fbad45628c33</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1610</ID>
- <PROCESSLIST>
- <PROCESS>NAVEXCELBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{5AA06644-BC46-4220-A460-47A6EB47C96D}</CLSID>
- <CLSID>{D80C4E21-C346-4E21-8E64-20746AA20AEB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>NavExcel/NavHelper Adware Toolbar and Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1611</ID>
- <PROCESSLIST>
- <PROCESS>VIEWBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F8AD5AA5-D966-4667-9DAF-2561D68B2012}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Viewpoint Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1612</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PYMDRB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PYMDRB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=57f1a80fd17e42806762fbad45628c33</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1613</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>EBPPW.DLL</PROCESS>
- <PROCESS>HEWFO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{733023F8-D55A-4917-A880-F53240E54D03}</CLSID>
- <CLSID>{0EB39889-F9CF-41EB-AB7A-0C3D38302BF3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SWin32 Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1614</ID>
- <PROCESSLIST>
- <PROCESS>CSAOLLDR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1639</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>EBPPW.DLL</PROCESS>
- <PROCESS>HEWFO.DLL</PROCESS>
- <PROCESS>YFTXK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{733023F8-D55A-4917-A880-F53240E54D03}</CLSID>
- <CLSID>{0EB39889-F9CF-41EB-AB7A-0C3D38302BF3}</CLSID>
- <CLSID>{D96C3EA3-9B85-412E-9D7C-79B19A2D1118}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SWin32 Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1712</ID>
- <PROCESSLIST>
- <PROCESS>SYSCFG16.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SYSCFG16.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1718</ID>
- <PROCESSLIST>
- <PROCESS>WINDSYST32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINDSYST32.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1719</ID>
- <PROCESSLIST>
- <PROCESS>SECURENET.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SECURENET.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1720</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CNSHOOK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D157330A-9EF3-49F8-9A67-4141AC41ADD4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CNS Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1728</ID>
- <PROCESSLIST>
- <PROCESS>GATOR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Gator Client Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1730</ID>
- <PROCESSLIST>
- <PROCESS>NAVAPP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NavExcel/NavHelper Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~NavExcel</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1744</ID>
- <PROCESSLIST>
- <PROCESS>SPNPING.EXE</PROCESS>
- <PROCESS>UNLODCTL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Troj/Dloader-FQ</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1745</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SCANSYS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B4EABC96-C93D-6C81-AFF4-CAFCB9575CBE}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown URL Search Hook (SCANSYS.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1746</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSOP.DLL</PROCESS>
- <PROCESS>MSFG.DLL</PROCESS>
- <PROCESS>MSKL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{D58476F4-161A-4BCD-B4F5-2F9835C5CA8F}</CLSID>
- <CLSID>{218B4ACE-3DDD-48F5-B43E-1F148B99BBD2}</CLSID>
- <CLSID>{7E87C089-80E1-44F1-B6F9-E124EE07940F}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (MSOP.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6c41347d34f49fe4eb76e7d78c0663f9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1747</ID>
- <PROCESSLIST>
- <PROCESS>WAREOUT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WareOut</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY></CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~WareOut</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1749</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>COIZJ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{57CC50E3-C41E-4B60-B345-BF4CF6927F11}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (COIZJ.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1795</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CHINREF.EXE)</PROCESS>
- <PROCESS>(LISTTR~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e2dddbcc8eefe539f613f5ddde481157</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1796</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WARNLIESSECT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=07720ba3e2efe3bdd9d4a5cb5f3787ac</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1808</ID>
- <PROCESSLIST>
- <PROCESS>WINADCTL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows AdControl WINADCTL.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~AdControl</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1809</ID>
- <PROCESSLIST>
- <PROCESS>WINADALT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows AdControl WINADALT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~AdControl</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1810</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL16.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>RUNDLL16.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1811</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>STLB2.DLL</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~stlb2.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1812</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>FEN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{95795B67-BBAB-47d0-8A9F-069E8242C0E5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FlashTrack BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1813</ID>
- <PROCESSLIST>
- <PROCESS>SVHOST32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVHOST32.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1828</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSEVA.DLL</PROCESS>
- <PROCESS>MSIBX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{AC0F92CF-A0A6-4A3F-9469-685489F3B25A}</CLSID>
- <CLSID>{64525392-CE21-4E79-B4F7-F296189A4C3A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHOs (MSEVA.DLL, MSIBX.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=331c439f1c5873e6b933ef1b053fe097</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1829</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>YKPGVNEU.DLL</PROCESS>
- <PROCESS>XTSH.DLL</PROCESS>
- <PROCESS>EBFQKT.DLL</PROCESS>
- <PROCESS>VXWRVHN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{D42DB730-2DF5-7E75-8696-72A2DB813E96}</CLSID>
- <CLSID>{D608EF38-05FB-0875-D79B-04A2ABA46B9D}</CLSID>
- <CLSID>{A029E041-5F86-2B2A-D596-76A2DDF767C5}</CLSID>
- <CLSID>{DB0BC44F-7FA4-5F71-84E6-04A2D88668E0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHOs (YKPGVNEU.DLL, XTSH.DLL, etc.)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0db51899c207aa3ed620ddd8c20ae43e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1830</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MCICDB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{DC6AA004-965C-4F84-9D18-EEC4F2447900}</CLSID>
- <CLSID>{1E4F72D9-2022-4BBF-BC59-3EEA3A8D66FF}</CLSID>
- <CLSID>{6EC0DA40-A355-4BCD-BF9D-6F98B8D63A62}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (MCICDB.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1831</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MADB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B5CFE154-566C-483A-81C5-A349C9CC0506}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (MADB.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1832</ID>
- <PROCESSLIST>
- <PROCESS>WINMSDC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINMSDC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1833</ID>
- <PROCESSLIST>
- <PROCESS>VWIPXSPNT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>VWIPXSPNT.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1834</ID>
- <PROCESSLIST>
- <PROCESS>USRSHUTD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>USRSHUTD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1835</ID>
- <PROCESSLIST>
- <PROCESS>TLNTADMNX.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TLNTADMNX.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1836</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(UCTC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>UCTC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d874b805287fb7fcf551a09a710bfae6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1867</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SYSUPD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{5B4AB8E2-6DC5-477A-B637-BF3C1A2E5993}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.iSearch.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1868</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HSRB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{285B5CCD-C3F0-4EB6-9632-7D0A3C3AF824}</CLSID>
- </CLSIDLIST>
- <SUMMARY>HSRB Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1910</ID>
- <PROCESSLIST>
- <PROCESS>FDGO.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Fresh Download Software</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1948</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SETGLBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{531553EB-B210-4116-BC2C-C09608F4193E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spywar.DigitalNames Spyware Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1955</ID>
- <PROCESSLIST>
- <PROCESS>MSSTART.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>LIVUP.C Trojan Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=31d752d85a68d1a761ed09a7fca1af72</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1975</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AP9H4QMO.EXE)</PROCESS>
- <PROCESS>(GAH95ON6.EXE)</PROCESS>
- <PROCESS>(IBECDBV8.EXE)</PROCESS>
- <PROCESS>(ABASA5JRP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.ShopAtHomeSelect.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f011214997dfe3923690742434096533</CONDITION>
- <CONDITION>MD5=722596BADF6A415C3D70ACC7577CBA8E</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1977</ID>
- <PROCESSLIST>
- <PROCESS>BEARSHARE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BearShare File Sharing Client</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1978</ID>
- <PROCESSLIST>
- <PROCESS>FARMMEXT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Installed (reportedly) with eBaysMoMoneyMaker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~FarmMext</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1981</ID>
- <PROCESSLIST>
- <PROCESS>EZSTUB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Bundleware</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1984</ID>
- <PROCESSLIST>
- <PROCESS>BW2.COM</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW2.COM Loader Application (Variant 1)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=31a85ad4443e0c65c710d146fe3041ca</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1985</ID>
- <PROCESSLIST>
- <PROCESS>BW2.COM</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW2.COM Loader Application (Variant 2)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=01ca92acf920f9ef759573d609318011</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1986</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ACID BASE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c8f8c1ff6d2288d53936c20b86d80348</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1987</ID>
- <PROCESSLIST>
- <PROCESS>SMSS32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SMSS32.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1988</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>INETCONNECT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FD3A6AB4-5527-4B52-90AF-F90CD3270861}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MultiClicker BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1990</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DSMANA~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{962F12AE-2773-4BEB-99EA-B5C3AB9A6606}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1991</ID>
- <PROCESSLIST>
- <PROCESS>PDSCHED.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SDBOT.CN Trojan Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=017f827ebc26d39b243b0977ad8b9836</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1996</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BIRD JUNK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a8f9447cfee9b9e85950cfe7302fc9d8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1997</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SURFSITEPLUS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8abe1ce6b32f1ee5a5252481e4edb438</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1998</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(REFBONE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ddccc054f2db0b3fa4a15a0735cd1fe5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>1999</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OEBXLII.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>OEBXLII.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=831a32629441e2e57d14730a59e27f21</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2000</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>UPSPIRAL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-DEFF-ED65A486AA28}</CLSID>
- </CLSIDLIST>
- <SUMMARY>UpSpiral Toolbar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2001</ID>
- <PROCESSLIST>
- <PROCESS>NTSMOD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NT System Module</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2002</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>4B_1,0,1,2_MSLAGENT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{008DB894-99ED-445D-8547-0E7C9808898D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Slagent BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2003</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>RK.EXE</PROCESS>
- <PROCESS>MKSC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>RelevantKnowledge Spyware Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~RelevantKnowledge</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2004</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PWRSMND1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-A3FA-F161A787AD2D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>PowerSearch BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2005</ID>
- <PROCESSLIST>
- <PROCESS>MTSOEMON.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MyTotalSearch Email Plugin</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2006</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MTSSRCAS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00BD2861-C654-4694-A44A-98642D73247D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MyTotalSearch Search Assistant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2007</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MTSBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{094176F1-BF35-4bcb-B68A-108DFB8C3825}</CLSID>
- </CLSIDLIST>
- <SUMMARY>My Total Search Toolbar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2008</ID>
- <PROCESSLIST>
- <PROCESS>I11R54N4.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bagle/Beagle Internet Worm Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2009</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>APIHF32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FA6A4655-C13C-BF9A-C97E-513B7A9A010A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO/URL Search Hook (APIHF32.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2010</ID>
- <PROCESSLIST>
- <PROCESS>REMOVE_SPYWARE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Remove_spyware.exe</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2011</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSAXS.DLL</PROCESS>
- <PROCESS>MSPUA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{770C971E-08B7-497E-8F67-801EBA1ECC4D}</CLSID>
- <CLSID>{EB77D262-F353-4AA9-B2BB-889660B0F5EA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (MSAXS.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2012</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SDMTB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{441354C5-911B-409B-9A66-A11D6D4E1A22}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Web Directory Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2014</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NKWISHOY.DLL</PROCESS>
- <PROCESS>HCMNELCK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{B36759C9-29AB-E3D6-5690-B0A5CC7A9ACD}</CLSID>
- <CLSID>{EDE958EB-C904-3795-0DB6-6CCB97601BB9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IEloader Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- <CONDITION>FILEDESCRIPTION=IEloader Module</CONDITION>
- <CONDITION>INTERNALNAME=IEloader</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2016</ID>
- <PROCESSLIST>
- <PROCESS>MCICDB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{DC6AA004-965C-4F84-9D18-EEC4F2447900}</CLSID>
- <CLSID>{1E4F72D9-2022-4BBF-BC59-3EEA3A8D66FF}</CLSID>
- <CLSID>{6EC0DA40-A355-4BCD-BF9D-6F98B8D63A62}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Browser Extension (MCICDB.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2017</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>EBPPW.DLL</PROCESS>
- <PROCESS>HEWFO.DLL</PROCESS>
- <PROCESS>YFTXK.DLL</PROCESS>
- <PROCESS>LCVMM.DLL</PROCESS>
- <PROCESS>GBTIH.DLL</PROCESS>
- <PROCESS>RTKBP.DLL</PROCESS>
- <PROCESS>MVQZZ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{733023F8-D55A-4917-A880-F53240E54D03}</CLSID>
- <CLSID>{0EB39889-F9CF-41EB-AB7A-0C3D38302BF3}</CLSID>
- <CLSID>{D96C3EA3-9B85-412E-9D7C-79B19A2D1118}</CLSID>
- <CLSID>{73DC7B56-FF55-4EE8-B68C-6EF0404965B8}</CLSID>
- <CLSID>{31A44560-6BA7-11D9-B056-00B0D0C263EE}</CLSID>
- <CLSID>{5A463000-6BA7-11D9-B056-00B0D0C263EE}</CLSID>
- <CLSID>{FD630860-6CD5-11D9-A1FA-00045A9A55D3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SWin32 Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>FILEDESCTIPTION=SWin32 Module</CONDITION>
- <CONDITION>INTERNALNAME=SWin32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2018</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KVGSPEEG.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{36ED1B80-8813-E6BA-20A3-A457E32E1BDD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (KVGSPEEG.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2019</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SEKFECH.DLL</PROCESS>
- <PROCESS>KZD.DLL</PROCESS>
- <PROCESS>TGDBNLLO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{AF0E441C-A8AA-FD03-806E-891D801045B2}</CLSID>
- <CLSID>{AD211133-F984-8901-D91F-8D1D844012B0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (SEKFECH.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e3f7db48140ae24eaa843e54f559c16a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2020</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KRDPOQUEJ.DLL</PROCESS>
- <PROCESS>GXWOHI.DLL</PROCESS>
- <PROCESS>KANFI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{BE7DE7CB-DA7C-9D7D-253F-4A8B31A3C214}</CLSID>
- <CLSID>{405CB368-5742-6C49-54C2-B4CD2CA77B1C}</CLSID>
- <CLSID>{CF87FC39-6897-F513-30E5-0EBC5A2A9C6A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f1d70f00c6e726bb57c0f4b4765b64d0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2022</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ZEAFNOSVJ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ZEAFNOSVJ.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=46adef9e695aad12f1f1548ba9f45b36</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2023</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NQVAVG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NQVAVG.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=efff434d22fa4c8ef9277f67056fa367</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2024</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ISFET.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ISFET.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2906aed2a080e5c9da90a19b8f64603d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2025</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ASNJNXJW.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{C5CF6D52-34C8-1FED-0FEE-B339CCFCAC4D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (ASNJNXJW.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9b4c4b90881a7d19714b7aefdb472af4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2026</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FLJB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FLJB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3c9685fcb80a5735f93d08018ba99890</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2027</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DEES.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DEES.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1b136b2887309a2dfe3a4ab329fb27c9</CONDITION>
- <CONDITION>MD5=3A44A2B0BBE61224EDD0503BDB01191F</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2028</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSCONFIG.EXE)</PROCESS>
- <PROCESS>(MCONFI~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c0276d582041bf6f026091ec8f22269c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2029</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ADWAREFILTER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1028F737-81E7-452B-A860-E50CAD90A08C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>AdwareFilter Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2030</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WJWF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WJWF.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e384560fe73801831e888501ce4529d0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2031</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSIBKD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{447160CD-ECF5-4EA2-8A8A-1F70CA363F85}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2032</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSDAIM.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0BA1C6EB-D062-4E37-9DB5-B07743276324}</CLSID>
- </CLSIDLIST>
- <SUMMARY>ClientMan Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2033</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ANBSXAY.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ANBSXAY.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0507cc1b7f1044b16621095edb8850aa</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2034</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINMONV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINMONV.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ff9cafabc0c784f0c38a03365bfcd91f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2035</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SNHELPER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-C0FB-EF60B19DB42E}</CLSID>
- <CLSID>{14B3D246-6274-40B5-8D50-6C2ADE2AB29B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Srng/ShopNav.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2036</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DREPLACE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{086AE192-23A6-48D6-96EC-715F53797E85}</CLSID>
- </CLSIDLIST>
- <SUMMARY>HTMLCore Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2037</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BAT ONCE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=580ce26927475b419463b1aad33954f0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2038</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BHO001.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{60E78CAC-E9A7-4302-B9EE-8582EDE22FBF}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Natural Language Navigation BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2039</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FEVLKF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FEVLKF.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c42d07bb41c892fc79e3f478b6a91b5c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2040</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ZSEARCH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{5886A6DC-AAF4-45E9-979A-8E5E6DEE30E7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>TotalVelocity.com ZSearch Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2041</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>OEL.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{5BBC0AC0-B173-C180-7F65-9FDC3C6EB2B0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (OEL.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d358bea13e1972e71bbd18928f72ad14</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2042</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ENME.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{6BDF6423-C366-259E-D757-63557EF52A6A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (ENME.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7d011ff90fb9a13f75b2d2646f50d24f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2043</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{000006B1-19B5-414A-849F-2A3C64AE6939}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.BetterInternet.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2044</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>REG2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{63CF97E8-4133-438a-A831-CC9C6D47D673}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FlashTrack BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2045</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NSLOOKUP.EXE)</PROCESS>
- <PROCESS>(NLOOKU~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=53c73834e32ab740a50bbed28367547a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2046</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MRAR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MRAR.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c64cd83859e42ef4b93010b554a26ad5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2047</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SVCHOST.EXE)</PROCESS>
- <PROCESS>(CHOST~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bdddffbb1d097e8e05dc8669da32269b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2048</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(HSEO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>HSEO.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=baf6841fc91d47b96ebcc38d86c41275</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2049</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BITS STORE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=780f2472a375cdc6cd6c5e42757a4f94</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2050</ID>
- <PROCESSLIST>
- <PROCESS>WINSA32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINSA32.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2051</ID>
- <PROCESSLIST>
- <PROCESS>SCVHOSTINGG.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SCVHOSTINGG.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2052</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>4Y6O7IZTLI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A6790AA5-C6C7-4BCF-A46D-0FDAC4EA99EB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>TROJ_FAVADD.C Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2053</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AXIS ERROR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=089f9f4f4da56b2901ed43dc37218030</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2054</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EACH README.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=dac00ab3d55212def3b02849db6ee269</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2055</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SPM1316.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CF021F40-3E14-23A5-CBA2-7173706D1316}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Tubby BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2056</ID>
- <PROCESSLIST>
- <PROCESS>SWITPA.EXE</PROCESS>
- <PROCESS>SWITPB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.OfferAgent.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2057</ID>
- <PROCESSLIST>
- <PROCESS>ADSTATKEEP.EXE</PROCESS>
- <PROCESS>ADSTATSERV.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>AdStatus Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2065</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PQQSE.DLL</PROCESS>
- <PROCESS>PSU.DLL</PROCESS>
- <PROCESS>ZVQMU.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B1FFFEF8-6E61-6FCE-3A04-6AB329E90BC7}</CLSID>
- <CLSID>{10F20DDD-15A2-4B8B-A1B6-CEA9EA920797}</CLSID>
- <CLSID>{7FE86F19-B6C1-40CA-B5A8-7C897B2520E6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Spyware/Parasite Browser Helper Objects</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2066</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>YXEBOQQIJEVZPF.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b353d450268b72b4c23747ceeb6889ae</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2075</ID>
- <PROCESSLIST>
- <PROCESS>WEOEQKRBA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{01B85B1D-B430-4E31-B01B-41BFCC259079}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Trojan.Ksoa</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2076</ID>
- <PROCESSLIST>
- <PROCESS>GOGOLAUNCH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>LaunchAdware Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~LaunchAdware</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2085</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SIDEFIND.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8CBA1B49-8144-4721-A7B1-64C578C9EED7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.IST/SideFind.Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2086</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FMAJPL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>FMAJPL.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c19a7148606dfb306f8368a70467c104</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2097</ID>
- <PROCESSLIST>
- <PROCESS>SVCNET.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>W32.Tibick Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5a50208f3c25faba022df34cd1aa661a</CONDITION>
- <CONDITION>MD5=A09C71D2C5B81E8146ACE145785B7F04</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2101</ID>
- <PROCESSLIST>
- <PROCESS>CSBAND.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{90C61707-C8F8-43DB-A25C-C1F4B18EE41E}</CLSID>
- <CLSID>{EDC4193F-34AD-4D07-AA87-E3FDB89E3E76}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Comet Cursor Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2103</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HNAQYGE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{22B9A67D-E689-44B6-B775-0E8FE84B4F9B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>bho8 Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2104</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(HZLJGR.EXE)</PROCESS>
- <PROCESS>(UEJKECKV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>HZLJGR.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2b4078e115e7d199b60d722f66669dcb</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2105</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(XVCWMGUP.EXE)</PROCESS>
- <PROCESS>(QGSCOPDJ.EXE)</PROCESS>
- <PROCESS>(WIN32.EXE)</PROCESS>
- <PROCESS>(BKLUTAJN.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WIN32.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=76e4afd0718745c8475495b1f83a8db8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2106</ID>
- <PROCESSLIST>
- <PROCESS>SBHC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SuperBar IE Parasite</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SuperBar</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2108</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>RPWLGMYP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{46F25112-B9A4-12F6-F0CB-480C0BFBAD49}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown (RPWLGMYP.DLL) Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2109</ID>
- <PROCESSLIST>
- <PROCESS>CSBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D14D6793-9B65-11D3-80B6-00500487BDBA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Comet Cursor BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2110</ID>
- <PROCESSLIST>
- <PROCESS>CSIETB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FE6BC4EF-5676-484B-88AE-883323913256}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Comet Cursor Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2111</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINNB56.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9A9C9B69-F908-4AAB-8D0C-10EA8997F37E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>NN_Bar Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2112</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LIST CLOSE PHONE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0a0f062122ab41a572cf75aee06f9a1f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2113</ID>
- <PROCESSLIST>
- <PROCESS>ADMANCTL.EXE</PROCESS>
- <PROCESS>ADMANKEEP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Admanager Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2114</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TXWIBUF.DLL</PROCESS>
- <PROCESS>HKX.DLL</PROCESS>
- <PROCESS>YNHEKQFD.DLL</PROCESS>
- <PROCESS>LGIRCMJ.DLL</PROCESS>
- <PROCESS>BWDRDP.DLL</PROCESS>
- <PROCESS>VRVHKGXP.DLL</PROCESS>
- <PROCESS>ETJIV.DLL</PROCESS>
- <PROCESS>AGMF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{BB014331-D183-8A51-843D-884DF1A42BCD}</CLSID>
- <CLSID>{EB201F45-A0F0-8F2B-D73A-8C4DF1A673E1}</CLSID>
- <CLSID>{99523B47-D3FD-FC05-803E-8A4D85D273C7}</CLSID>
- <CLSID>{9B726D60-A0A1-9E29-D149-FD4D86A073E1}</CLSID>
- <CLSID>{B8274C64-D2D4-FD5E-D53E-8A4D84D573CF}</CLSID>
- <CLSID>{BF064236-A8F0-AF53-823E-FC4DF3D52BC2}</CLSID>
- <CLSID>{91741836-D7A4-8055-D13C-8C4D82A62C97}</CLSID>
- <CLSID>{CB734143-A183-DC71-D53A-8A4DF5F37CE2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7f71a71d175c9433e2ccbd889b6c702c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2115</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KKBMFJ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{E3827E11-2F47-40D6-8442-799BCDA592C2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (KKBMFJ.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2116</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CDEM.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7FED5399-912E-93F9-7B60-98DC483FE2C1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (CDEM.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2117</ID>
- <PROCESSLIST>
- <PROCESS>WUVIEWER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WUVIEWER.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2118</ID>
- <PROCESSLIST>
- <PROCESS>WINADSERV.EXE</PROCESS>
- <PROCESS>WINADSLAVE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows Adservice Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2119</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(YVPEDKG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>YVPEDKG.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b67f943ba6703e4caff5da57c82c72e0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2120</ID>
- <PROCESSLIST>
- <PROCESS>PYNIX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{00000000-DD60-0064-6EC2-6E0100000000}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Pynix Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2121</ID>
- <PROCESSLIST>
- <PROCESS>SPOOLMGR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NT System Module</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2122</ID>
- <PROCESSLIST>
- <PROCESS>XPSP2FW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>XPSP2FW.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2123</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VPEPL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>VPEPL.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=43d8f6a63e37d91ddb09f87d5d0df99b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2124</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TIBS3.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TIBS3.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=cee246365ae74bdaf98f287b1aa0e544</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2125</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DUI3DV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DUI3DV.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7fbc072f6ba100b6e8bf0a098fefeb91</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2126</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(96FYD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>96FYD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=37e6ad0c10a5d0e5257d930ef36aba40</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2127</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IPNJ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>IPNJ.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=59672ec91fe2c45a90eb2be8a20b3e40</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2128</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CRJX32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CRJX32.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ce2a18c1fd22febcff876564e1fbf3c7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2129</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EXP1ORER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS EXPLORER.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d2adc4abc1c67cb64c0887a3b8307e65</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2130</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>VOICEIP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000250-0320-4DD4-BE4F-7566D2314352}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Transponder Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2132</ID>
- <PROCESSLIST>
- <PROCESS>WAATSERVICE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WAATSERVICE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2133</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ZORB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>ZORB.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6acbf087a155528cc567b4f28443adf7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2136</ID>
- <PROCESSLIST>
- <PROCESS>WINSTAT.EXE</PROCESS>
- <PROCESS>WINSTATKEEP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows AdStatus Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~AdStatus</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2138</ID>
- <PROCESSLIST>
- <PROCESS>DESKADKEEP.EXE</PROCESS>
- <PROCESS>DESKADSERV.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DeskAd Service Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2142</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(2F9Z5N3.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>2F9Z5N3.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=911ded730eac4ed07b22ef000301cb31</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2143</ID>
- <PROCESSLIST>
- <PROCESS>SHHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>OutLaster Backdoor Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~OutLaster</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2144</ID>
- <PROCESSLIST>
- <PROCESS>ESYNDICATEINST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>eSyndicate Adware Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2145</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KEOOBIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{15ACE85C-0BB1-42d1-9E32-07EB0506675A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Dloader-NL Trojan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2152</ID>
- <PROCESSLIST>
- <PROCESS>LOCALSPLNET.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{41943050-65CC-454B-81E4-9C8A9D7CBAEA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Parasite</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~Local</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2153</ID>
- <PROCESSLIST>
- <PROCESS>SVSHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVSHOST.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2154</ID>
- <PROCESSLIST>
- <PROCESS>WUAMPD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WUAMPD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2155</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SYSMONNT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SysMon Adware Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=31035e5ea2afe9315728916f3597d56c</CONDITION>
- <CONDITION>MD5=E922B299A5D349D050A65F482F088491</CONDITION>
- <CONDITION>MD5=63627112A1CB31A3EDC6C3AF4ADC8401</CONDITION>
- <CONDITION>MD5=3EE451B5B43C5361300A3854F1A24E4C</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2156</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DGDCJTE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DGDCJTE.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a035eff25b530efc227f4dd32cc6908b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2157</ID>
- <PROCESSLIST>
- <PROCESS>IPREG32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{031B6D43-CBC4-46A5-8E46-CF8B407C1A33}</CLSID>
- </CLSIDLIST>
- <SUMMARY>DownCom Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2158</ID>
- <PROCESSLIST>
- <PROCESS>ASBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{BB936323-19FA-4521-BA29-ECA6A121BC78}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Coolbar by 3721.com</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~CoolBar</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2159</ID>
- <PROCESSLIST>
- <PROCESS>ASSIST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1B0E7716-898E-48cc-9690-4E338E8DE1D3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolBar URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~Assist</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2160</ID>
- <PROCESSLIST>
- <PROCESS>ASSISTSE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CnsMin / Coolbar Related Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~3721</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2163</ID>
- <PROCESSLIST>
- <PROCESS>SYSTIME.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SYSTIME.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2164</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ME2.DLL)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{85A702BA-EA8F-4B83-AA07-07A5186ACD7E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Medialoads Enhanced/Downloadware or ClipGenie</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~MediaLoads</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2165</ID>
- <PROCESSLIST>
- <PROCESS>LCI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{685AAA63-6550-11D9-823F-000C9C565796}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Spyware/Adware Variant Browser Helper Object (BHO)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2168</ID>
- <PROCESSLIST>
- <PROCESS>IWONBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C298FB42-E3E2-11D3-ADCD-0050DAC24E8F}</CLSID>
- <CLSID>{CA0B9B71-C2AF-11D3-B376-0800460222F0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>iWon Co-Pilot for Internet Explorer and Netscape</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~iWon</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2182</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>404SEARCH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{53C330D6-A4AB-419B-B45D-FD4411C1FEF4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>404Search Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~404Search</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2183</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ABAR.DLL</PROCESS>
- <PROCESS>BAIDUBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B580CF65-E151-49C3-B73F-70B13FCA8E86}</CLSID>
- </CLSIDLIST>
- <SUMMARY>BaiduBar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~BaiduBar</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2185</ID>
- <PROCESSLIST>
- <PROCESS>BDHELPER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CA92B524-BC8A-4610-BD2C-6BD3E28155D0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CnsMin Variant Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~BDHelper</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2186</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BDPLUGIN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{BC207F7D-3E63-4ACA-99B5-FB5F8428200C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>BDHelper Shell Execute Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2187</ID>
- <PROCESSLIST>
- <PROCESS>BDSRHOOK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2C5AA40E-8814-4EB6-876E-7EFB8B3F9662}</CLSID>
- </CLSIDLIST>
- <SUMMARY>BD Url Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~SearchHook</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2188</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CRBK32.DLL</PROCESS>
- <PROCESS>IEKD32.DLL</PROCESS>
- <PROCESS>MSAI.DLL</PROCESS>
- <PROCESS>MFCQW.DLL</PROCESS>
- <PROCESS>D3UB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{C7D9E145-52DB-B4D5-50F2-B854335AD4B1}</CLSID>
- <CLSID>{E843DEFD-22B6-EBB3-0AC4-2EE1DC8C5882}</CLSID>
- <CLSID>{FC4D1C93-3A3E-35D2-1515-1A241B913EAD}</CLSID>
- <CLSID>{FCDF3AFF-011A-349F-5BA9-2BD2618D0F10}</CLSID>
- <CLSID>{E374D485-455A-EA4B-4D0D-A9597EFAF27B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Adware BHO Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=34941906fd0e3079317ccec02871c2b8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2189</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DIGITA~6.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{183D5161-0C62-4295-896C-44E7442CD6F2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.DigitalNames Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~URL</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2197</ID>
- <PROCESSLIST>
- <PROCESS>NHMOOF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6F26D74F-96FA-4FED-8039-361B549856E4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2199</ID>
- <PROCESSLIST>
- <PROCESS>BTLINK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D6DFF6D8-B94B-4720-B730-1C38C7065C3B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Huntbar Related Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2200</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DASHBAR21.DLL</PROCESS>
- <PROCESS>DASHBAR15.DLL</PROCESS>
- <PROCESS>DASHBAR17.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CC90CDA0-74A0-45B4-80EF-D89CA8C249B8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.GAIN/DashBar.Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2201</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>Q433828.DLL</PROCESS>
- <PROCESS>Q543642984.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{B52C2252-650F-4E9F-88AB-0F40D74EEB4A}</CLSID>
- <CLSID>{1CB7DA9D-97E5-4FFB-8371-992C60CCE2F2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown and Randomly Named/Registered Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0b45afd128e1fbcb2d40d7e1a8f13a3a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2203</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CNBABE.DLL</PROCESS>
- <PROCESS>CNBARIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000000-0000-0000-0000-000000000000}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CommonName Toolbar/Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~BabeIE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2205</ID>
- <PROCESSLIST>
- <PROCESS>PROTECT32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{002FB48C-A41C-49AF-A312-7EC17E963F1A}</CLSID>
- <CLSID>{FF06E421-6BB3-11D9-A13A-4445FAECD4B1}</CLSID>
- <CLSID>{2F1EF902-4A68-42CB-A570-FD765449CFE0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2206</ID>
- <PROCESSLIST>
- <PROCESS>WINSRM32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0AEE4D0C-4B38-4196-AE32-70ACE5656647}</CLSID>
- <CLSID>{4B8F38C7-62FC-4762-B9A0-27E63F768167}</CLSID>
- </CLSIDLIST>
- <SUMMARY>iLookup Related Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2207</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>XUNLEIBHO_V1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0005A87D-D626-4B3A-84F9-1D9571695F55}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2210</ID>
- <PROCESSLIST>
- <PROCESS>WINNET.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CommonName Spyware Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~CommonName</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2211</ID>
- <PROCESSLIST>
- <PROCESS>EVTHTM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adult Porn Dialer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d0db9a633a29b8e29f78ab89f4fdd45d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2212</ID>
- <PROCESSLIST>
- <PROCESS>MSBLAST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MSBlast Internet Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2213</ID>
- <PROCESSLIST>
- <PROCESS>SHCH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adult Porn Dialer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3fdfacf15063486fd4899ca28ed81c12</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2214</ID>
- <PROCESSLIST>
- <PROCESS>BALMBLUE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5f604fdec2af078541978a1500b85caa</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2215</ID>
- <PROCESSLIST>
- <PROCESS>FWNTOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3D0BDAB3-12F4-471C-8966-E35A2C6C7DE7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FindWhatEverNow Toolbar for Internet Explorer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2216</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HTMLEDIT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1E1B2879-88FF-11D2-8D96-D7ACAC95951F}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch or CommonName Browser Helper</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2217</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(YENQC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown (Possible Lop.com) Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=81da86d8d7b72f13796a64f0fe4616d8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2218</ID>
- <PROCESSLIST>
- <PROCESS>BRIDGE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9C691A33-7DDA-4C2F-BE4C-C176083F35CF}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.WinFavorites</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2219</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TIBS3.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0dc6a048b469e8b498c1e119b9f2a2fa</CONDITION>
- <CONDITION>MD5=26A62E774A55B13F3CF2D274017D9BF7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2220</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WTOOLST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8DA5457F-A8AA-4CCF-A842-70E6FD274094}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2230</ID>
- <PROCESSLIST>
- <PROCESS>LCDSAB13.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SuperAdBlocker Illegal Crack File</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c2766d98b91629191192cf383048e9d0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>1</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2231</ID>
- <PROCESSLIST>
- <PROCESS>MSADBLOCK32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{1DF2DDE1-03C1-9F7D-1398-514C7EBD00BA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Browser Hi-Jacker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2232</ID>
- <PROCESSLIST>
- <PROCESS>SARISTAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C68AE9C0-0909-4DDC-B661-C1AFB9F5AE50}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Coulomb Dialer Parasite</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2236</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HGLE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D97A9332-0ED3-7902-D7E2-01A2AFF73BE4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2237</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PSKW.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3EDF385A-E34C-79E1-8205-125504F17A3B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2238</ID>
- <PROCESSLIST>
- <PROCESS>SDKGD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0B9E0B4B-FD49-6278-3F77-654C70658958}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2239</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINDJ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{AB6F81AC-6C76-BCBF-C021-1BA9321DF5F0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=884cf0b4be3e40b71d9cfa8762e7a864</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2240</ID>
- <PROCESSLIST>
- <PROCESS>WTLBASS32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A0ED918D-B8E6-4c3d-BD15-1DB1AE9A5DD3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>AnalyzeIE (Unknown Browser Helper Object)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2244</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LINKWAIT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B0B5717C-FAA6-865B-42CB-329A964F309C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2245</ID>
- <PROCESSLIST>
- <PROCESS>BMS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C18517DA-CA70-46CE-86F4-882F6B62E975}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.DigitalNames Browser Hijacker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2246</ID>
- <PROCESSLIST>
- <PROCESS>KEYBAND.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{46D387E9-41FC-4F71-A7C3-B0BEB3568F00}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Related to Spyware.DigitalNames Hijacker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2247</ID>
- <PROCESSLIST>
- <PROCESS>KEYSERVICE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.DigitalNames (UBizNames)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~UBizNames</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2248</ID>
- <PROCESSLIST>
- <PROCESS>OLEABHO6.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{91F9A5B6-F7F3-4491-BE96-5A78EE0B825E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~abho.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2249</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SNHZZOA.DLL</PROCESS>
- <PROCESS>WHHZZOA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{7E64AB8B-C7AC-377E-9DF1-7FCA328C6193}</CLSID>
- <CLSID>{B1726C8B-80FF-3A13-AD7A-11841E0DA623}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Objects</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~axHelper</CONDITION>
- <CONDITION>PRODUCTNAME~axHelper</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2250</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WHWZZOA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9BFAB061-A618-387D-8048-32AA9F57D073}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~activex.dll</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2251</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WININGSYSJ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=825623e6ae701cfe4d1dbf729b4b24d6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2252</ID>
- <PROCESSLIST>
- <PROCESS>ZZOA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{85E59517-4C2E-40A0-A997-1D53E1007828}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2253</ID>
- <PROCESSLIST>
- <PROCESS>DSSAGENT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Background Agent Application by Broderbund Software</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~background</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2258</ID>
- <PROCESSLIST>
- <PROCESS>ACTIVEBANNER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A11F2B00-71BC-4667-A24F-EE9D27F010C8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Active Banner Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~ActiveBanner</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2259</ID>
- <PROCESSLIST>
- <PROCESS>CNILA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{65F1B157-1532-4F3A-9B85-3DD4F91035C2}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2260</ID>
- <PROCESSLIST>
- <PROCESS>KBD20KA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3ED8ACD1-583F-4ECE-B46F-FC4FA189E184}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~kbd20ka</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2261</ID>
- <PROCESSLIST>
- <PROCESS>OB2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0F9E1CB9-1B32-436B-B44C-BC7B7369CB9B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Onban (Symantec Listed)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME~OB2.DLL</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2262</ID>
- <PROCESSLIST>
- <PROCESS>ONBAN001.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CA35A44E-3799-49ED-98CF-C3944FE74370}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object (OnBan Adware Related)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~onban001</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2263</ID>
- <PROCESSLIST>
- <PROCESS>MFCVS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F00DEE37-8509-AE59-6FB2-C712632ECE8B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREATS</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2264</ID>
- <PROCESSLIST>
- <PROCESS>SPECIALFILE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>RBOT.RH Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ed1be867fb5dcc15951352a9b6b71709</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2273</ID>
- <PROCESSLIST>
- <PROCESS>AYVOVVKQ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6DCFFF6D-1385-632F-A80E-1C9448EE88CD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2276</ID>
- <PROCESSLIST>
- <PROCESS>TBC.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9EAC0102-5E61-2312-BC2D-544243544243}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2278</ID>
- <PROCESSLIST>
- <PROCESS>TBGAME.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{02ffc86e-283e-4faa-95d6-addca024f30a}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Effective Brand Toolbar/180Search Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~Effective</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2279</ID>
- <PROCESSLIST>
- <PROCESS>X1FF.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{CE7EF827-47CC-48EB-B570-C367F1E1277E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Ride Marketing Group Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2281</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WEBDLG32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{30192F8D-0958-44E6-B54D-331FD39AC959}</CLSID>
- <CLSID>{0E1230F8-EA50-42A9-983C-D22ABC2EED3B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IWantSearchBar Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2282</ID>
- <PROCESSLIST>
- <PROCESS>CAPATTTCL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{036652D4-A54E-2597-BBAB-E8228DA3DECC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unidentified URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2283</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BTIEIN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{63B78BC1-A711-4D46-AD2F-C581AC420D41}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2284</ID>
- <PROCESSLIST>
- <PROCESS>PWG.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>n-Case Spyware Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a9bc3c424d4851e3d0076cc84223bd14</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2285</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KDPUPD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F281FFC7-6C63-4bf9-83F2-AB7A6157B109}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SafeGuared Protect Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2286</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PDFUPD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D4D505DF-D582-400c-91B6-84921012AFE3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SafeGuardProtect/Veevo Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2287</ID>
- <PROCESSLIST>
- <PROCESS>XM320.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7371F073-AC0F-4b80-BB2F-96A488CEFB32}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FlashTrack Adware Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2288</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINTASK.EXE</PROCESS>
- <PROCESS>EXP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Trojan Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3f660d7a76423ad2a72e70c972767f88</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2289</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NEM218.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F7F808F0-6F7D-442C-93E3-4A4827C2E4C8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Avenue Media/Internet Optimizer.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2290</ID>
- <PROCESSLIST>
- <PROCESS>4B_1,0,1,0_MSLAGENT.DLL</PROCESS>
- <PROCESS>4B_1,0,1,1_MSLAGENT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{021BB032-80A8-4FB6-B3D5-CF27B1553B95}</CLSID>
- <CLSID>{ACB3E0B7-7D0C-40B7-99B3-3EEACDF86BFB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Slagent Trojan Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2291</ID>
- <PROCESSLIST>
- <PROCESS>IETOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EA5A82FB-D6BE-44F9-9363-B1ABABC153C1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>MBKWBar Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2292</ID>
- <PROCESSLIST>
- <PROCESS>AEMD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7BECB7A8-8472-4F91-B419-94792540C862}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (AEMD.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2293</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>QGJMXVIW.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D358C610-59D1-0C0F-87EE-77A2D0D669B3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (QGJMXVIW.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2294</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GKVTX.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GKVTX.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6a24254ca59a1d797bef465367b62497</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2296</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(QXOMWH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>QXOMWH.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0525f66ceebf5f7d8f4ef63e6d5f249a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2297</ID>
- <PROCESSLIST>
- <PROCESS>IESEARCHBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{71ED4FBA-4024-4bbe-91DC-9704C93F453E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>BlazeFind Internet Explorer Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2298</ID>
- <PROCESSLIST>
- <PROCESS>SYSSFITB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C109664B-CEB1-420B-B353-D55A561536DD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>AdShooter Adware/Search For It Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2299</ID>
- <PROCESSLIST>
- <PROCESS>M030206POHS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{57A746CE-AAEC-4DDE-83B0-31C0938EBC0B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>WulrdMedia Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2300</ID>
- <PROCESSLIST>
- <PROCESS>SQUERYCONTROL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SQuery Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~ExMsgHook</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2301</ID>
- <PROCESSLIST>
- <PROCESS>EZC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Win-Adware/EZCodec</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~WingProc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2315</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BH304181.DLL</PROCESS>
- <PROCESS>BH309190.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{029CA12C-89C1-46A7-A3C7-82F2F98635CB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Kontiki Download Manager Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2316</ID>
- <PROCESSLIST>
- <PROCESS>BAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EE392A64-F30B-47C8-A363-CDA1CEC7DC1B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Newton Known Search Hi-Jacker and Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2317</ID>
- <PROCESSLIST>
- <PROCESS>BLEINP.DLL</PROCESS>
- <PROCESS>KZTKEWUR.DLL</PROCESS>
- <PROCESS>GIEONINE.DLL</PROCESS>
- <PROCESS>JOLEYIG.DLL</PROCESS>
- <PROCESS>LDFH.DLL</PROCESS>
- <PROCESS>MSDOI.DLL</PROCESS>
- <PROCESS>IFGIB.DLL</PROCESS>
- <PROCESS>0NQYBBN.DLL</PROCESS>
- <PROCESS>238589K.DLL</PROCESS>
- <PROCESS>FEFL.DLL</PROCESS>
- <PROCESS>QWSXP.DLL</PROCESS>
- <PROCESS>DASHNEW.EXE</PROCESS>
- <PROCESS>OAEL.DLL</PROCESS>
- <PROCESS>PJDBCA.DLL</PROCESS>
- <PROCESS>MQMBQCK.DLL</PROCESS>
- <PROCESS>JOID.DLL</PROCESS>
- <PROCESS>TOFARI32.DLL</PROCESS>
- <PROCESS>UDEXBLH.DLL</PROCESS>
- <PROCESS>IERE32.DLL</PROCESS>
- <PROCESS>BNNJHD.DLL</PROCESS>
- <PROCESS>YQULTPGR.DLL</PROCESS>
- <PROCESS>APIKJ32.DLL</PROCESS>
- <PROCESS>MSDZR.DLL</PROCESS>
- <PROCESS>UKDUXZZR.DLL</PROCESS>
- <PROCESS>MIHAGO.DLL</PROCESS>
- <PROCESS>CBEB.DLL</PROCESS>
- <PROCESS>IOBE.DLL</PROCESS>
- <PROCESS>CIIBBK.DLL</PROCESS>
- <PROCESS>NGII.DLL</PROCESS>
- <PROCESS>WINXV.DLL</PROCESS>
- <PROCESS>BLEUOI.DLL</PROCESS>
- <PROCESS>AIWVUH.DLL</PROCESS>
- <PROCESS>LDJFNDA.DLL</PROCESS>
- <PROCESS>JAVAHX32.DLL</PROCESS>
- <PROCESS>DFMNBF.DLL</PROCESS>
- <PROCESS>MFCMB.DLL</PROCESS>
- <PROCESS>KTIPJ.DLL</PROCESS>
- <PROCESS>APIMI32.DLL</PROCESS>
- <PROCESS>APPWU32.DLL</PROCESS>
- <PROCESS>ASBKCRU.DLL</PROCESS>
- <PROCESS>BHGQSCP.DLL</PROCESS>
- <PROCESS>EOJICM.DLL</PROCESS>
- <PROCESS>JALVHKW.DLL</PROCESS>
- <PROCESS>JAVAHN32.DLL</PROCESS>
- <PROCESS>JUXQF.DLL</PROCESS>
- <PROCESS>MSRATEOLC.DLL</PROCESS>
- <PROCESS>MSWX.DLL</PROCESS>
- <PROCESS>TBNVF.DLL</PROCESS>
- <PROCESS>PROGVID.DLL</PROCESS>
- <PROCESS>SIPOZ.DLL</PROCESS>
- <PROCESS>DOEC.DLL</PROCESS>
- <PROCESS>LBPUY.DLL</PROCESS>
- <PROCESS>OEUU.DLL</PROCESS>
- <PROCESS>TTKUJ.DLL</PROCESS>
- <PROCESS>CRYN.DLL</PROCESS>
- <PROCESS>CVYCMB.DLL</PROCESS>
- <PROCESS>IEAR.DLL</PROCESS>
- <PROCESS>MFCCL32.DLL</PROCESS>
- <PROCESS>NDIWK.DLL</PROCESS>
- <PROCESS>RVBA.DLL</PROCESS>
- <PROCESS>BLOH.DLL</PROCESS>
- <PROCESS>D3VF32.DLL</PROCESS>
- <PROCESS>CEV.DLL</PROCESS>
- <PROCESS>GUTSKPCM.DLL</PROCESS>
- <PROCESS>GYZCWMY.DLL</PROCESS>
- <PROCESS>JFK.DLL</PROCESS>
- <PROCESS>QTUWKXU.DLL</PROCESS>
- <PROCESS>HPAL.DLL</PROCESS>
- <PROCESS>CDKP.DLL</PROCESS>
- <PROCESS>IPAU32.DLL</PROCESS>
- <PROCESS>MABUNXQM.DLL</PROCESS>
- <PROCESS>MDIA.DLL</PROCESS>
- <PROCESS>MMGY.DLL</PROCESS>
- <PROCESS>WINDC.DLL</PROCESS>
- <PROCESS>NETSK.DLL</PROCESS>
- <PROCESS>AFMU.DLL</PROCESS>
- <PROCESS>ZEAYQR.DLL</PROCESS>
- <PROCESS>APPLM32.DLL</PROCESS>
- <PROCESS>CLSC.DLL</PROCESS>
- <PROCESS>LJJL.DLL</PROCESS>
- <PROCESS>NPUIVZB.DLL</PROCESS>
- <PROCESS>DGJELA.DLL</PROCESS>
- <PROCESS>PCIKBC.DLL</PROCESS>
- <PROCESS>CERBMOD.DLL</PROCESS>
- <PROCESS>MSHNY.DLL</PROCESS>
- <PROCESS>QWSXP.DLL</PROCESS>
- <PROCESS>DVUTX.DLL</PROCESS>
- <PROCESS>UNJPH.DLL</PROCESS>
- <PROCESS>LCNH.DLL</PROCESS>
- <PROCESS>BOLN.DLL</PROCESS>
- <PROCESS>SDKCD.DLL</PROCESS>
- <PROCESS>EGKJ.DLL</PROCESS>
- <PROCESS>SFM.DLL</PROCESS>
- <PROCESS>OMDA.DLL</PROCESS>
- <PROCESS>NTZU.DLL</PROCESS>
- <PROCESS>JAVAQR.DLL</PROCESS>
- <PROCESS>IEKG32.DLL</PROCESS>
- <PROCESS>USPSMX.DLL</PROCESS>
- <PROCESS>AHAJ.DLL</PROCESS>
- <PROCESS>MFCBI.DLL</PROCESS>
- <PROCESS>VQXOLHRT.DLL</PROCESS>
- <PROCESS>NAFJB.DLL</PROCESS>
- <PROCESS>WINOQ32.DLL</PROCESS>
- <PROCESS>MFCVV.DLL</PROCESS>
- <PROCESS>ATLRS32.DLL</PROCESS>
- <PROCESS>JAKD.DLL</PROCESS>
- <PROCESS>3LPJI1NW.DLL</PROCESS>
- <PROCESS>SDKRG32.DLL</PROCESS>
- <PROCESS>WINJO.DLL</PROCESS>
- <PROCESS>UJXMYWQ.DLL</PROCESS>
- <PROCESS>EIS.DLL</PROCESS>
- <PROCESS>FHBB.DLL</PROCESS>
- <PROCESS>WUWECUNO.DLL</PROCESS>
- <PROCESS>YKEZN.DLL</PROCESS>
- <PROCESS>YNVXD.DLL</PROCESS>
- <PROCESS>ZOOMGYM.DLL</PROCESS>
- <PROCESS>YPJZFSVH.DLL</PROCESS>
- <PROCESS>WUHXHTZX.DLL</PROCESS>
- <PROCESS>WLXKSWZJ.DLL</PROCESS>
- <PROCESS>OPUVJXF.DLL</PROCESS>
- <PROCESS>IEDP.DLL</PROCESS>
- <PROCESS>BNREC.DLL</PROCESS>
- <PROCESS>GGGP.DLL</PROCESS>
- <PROCESS>MJHKFA.DLL</PROCESS>
- <PROCESS>ABE.DLL</PROCESS>
- <PROCESS>AOVDPHEL.DLL</PROCESS>
- <PROCESS>IJQ.DLL</PROCESS>
- <PROCESS>FNOPJAA.DLL</PROCESS>
- <PROCESS>SFCMAN32.DLL</PROCESS>
- <PROCESS>GPAB.DLL</PROCESS>
- <PROCESS>MPLN.DLL</PROCESS>
- <PROCESS>BEFK.DLL</PROCESS>
- <PROCESS>UVWCATEL.DLL</PROCESS>
- <PROCESS>IOGA.DLL</PROCESS>
- <PROCESS>JGBJ.DLL</PROCESS>
- <PROCESS>LMHA.DLL</PROCESS>
- <PROCESS>JBCK.DLL</PROCESS>
- <PROCESS>MSBVZ.DLL</PROCESS>
- <PROCESS>MSCAE.DLL</PROCESS>
- <PROCESS>EKGDMD.DLL</PROCESS>
- <PROCESS>DEIA.DLL</PROCESS>
- <PROCESS>MIHAHGA.DLL</PROCESS>
- <PROCESS>194FERH8.DLL</PROCESS>
- <PROCESS>CRBN.DLL</PROCESS>
- <PROCESS>ATLPM32.DLL</PROCESS>
- <PROCESS>FKADICB.DLL</PROCESS>
- <PROCESS>RTUEM.DLL</PROCESS>
- <PROCESS>XFFFWDG.DLL</PROCESS>
- <PROCESS>XRLVOHGJ.DLL</PROCESS>
- <PROCESS>HLIJ.DLL</PROCESS>
- <PROCESS>3VH1U0SG.DLL</PROCESS>
- <PROCESS>6AJVYX9C.DLL</PROCESS>
- <PROCESS>8DXV96YL.DLL</PROCESS>
- <PROCESS>AAMGF.DLL</PROCESS>
- <PROCESS>ADBLDAA.DLL</PROCESS>
- <PROCESS>WPTUYI.DLL</PROCESS>
- <PROCESS>SYSCT32.DLL</PROCESS>
- <PROCESS>MSGHY.DLL</PROCESS>
- <PROCESS>SYSLG32.DLL</PROCESS>
- <PROCESS>IECO.DLL</PROCESS>
- <PROCESS>BYXXEEC.DLL</PROCESS>
- <PROCESS>D3YJ32.DLL</PROCESS>
- <PROCESS>APIUZ32.DLL</PROCESS>
- <PROCESS>APIWG32.DLL</PROCESS>
- <PROCESS>TKVR.DLL</PROCESS>
- <PROCESS>GLAEIKA.DLL</PROCESS>
- <PROCESS>MMJCE.DLL</PROCESS>
- <PROCESS>QGKD.DLL</PROCESS>
- <PROCESS>ONDTJ.DLL</PROCESS>
- <PROCESS>GWTPG.DLL</PROCESS>
- <PROCESS>EPGFU.DLL</PROCESS>
- <PROCESS>MSOVF.DLL</PROCESS>
- <PROCESS>SDKON.DLL</PROCESS>
- <PROCESS>IJDCFE.DLL</PROCESS>
- <PROCESS>BHEDIIF.DLL</PROCESS>
- <PROCESS>APIVM32.DLL</PROCESS>
- <PROCESS>CGBBH.DLL</PROCESS>
- <PROCESS>EQDHO.DLL</PROCESS>
- <PROCESS>CNWBY.DLL</PROCESS>
- <PROCESS>VLUPU.DLL</PROCESS>
- <PROCESS>RDDUW.DLL</PROCESS>
- <PROCESS>HEJHZ.DLL</PROCESS>
- <PROCESS>GLQET.DLL</PROCESS>
- <PROCESS>DZNNX.DLL</PROCESS>
- <PROCESS>EKLG.DLL</PROCESS>
- <PROCESS>UGCCMOTY.DLL</PROCESS>
- <PROCESS>RRQTMNCV.DLL</PROCESS>
- <PROCESS>LMBVYYPZ.DLL</PROCESS>
- <PROCESS>IOPC.DLL</PROCESS>
- <PROCESS>MSKCT.DLL</PROCESS>
- <PROCESS>ENJD.DLL</PROCESS>
- <PROCESS>DFEA.DLL</PROCESS>
- <PROCESS>JOBO.DLL</PROCESS>
- <PROCESS>EHLABA.DLL</PROCESS>
- <PROCESS>IPOQ32.DLL</PROCESS>
- <PROCESS>OLIH.DLL</PROCESS>
- <PROCESS>YEMOL.DLL</PROCESS>
- <PROCESS>IEMG32.DLL</PROCESS>
- <PROCESS>SDKUE32.DLL</PROCESS>
- <PROCESS>D3DK.DLL</PROCESS>
- <PROCESS>YPEREY.DLL</PROCESS>
- <PROCESS>NGSDOAS.DLL</PROCESS>
- <PROCESS>KAY.DLL</PROCESS>
- <PROCESS>KPIPMHC.DLL</PROCESS>
- <PROCESS>OSKN.DLL</PROCESS>
- <PROCESS>YYAQKGKI.DLL</PROCESS>
- <PROCESS>UWUZOEUG.DLL</PROCESS>
- <PROCESS>NKDRBPBC.DLL</PROCESS>
- <PROCESS>JVRJDHEB.DLL</PROCESS>
- <PROCESS>KZDTAOSQ.DLL</PROCESS>
- <PROCESS>PUNVTPL.DLL</PROCESS>
- <PROCESS>EECDGOD.DLL</PROCESS>
- <PROCESS>IPUI.DLL</PROCESS>
- <PROCESS>ADDYH.DLL</PROCESS>
- <PROCESS>NTFO32.DLL</PROCESS>
- <PROCESS>IZROZS.DLL</PROCESS>
- <PROCESS>MSSCK.DLL</PROCESS>
- <PROCESS>MSIJ.DLL</PROCESS>
- <PROCESS>EPGYGYFX.DLL</PROCESS>
- <PROCESS>GGFJ.DLL</PROCESS>
- <PROCESS>NETIG.DLL</PROCESS>
- <PROCESS>SYSAW32.DLL</PROCESS>
- <PROCESS>YYX.DLL</PROCESS>
- <PROCESS>NGCFBVFD.DLL</PROCESS>
- <PROCESS>JFMBGEF.DLL</PROCESS>
- <PROCESS>AGDA.DLL</PROCESS>
- <PROCESS>APPGO32.DLL</PROCESS>
- <PROCESS>V6APQFP1.DLL</PROCESS>
- <PROCESS>AOID.DLL</PROCESS>
- <PROCESS>AUHEFIM.DLL</PROCESS>
- <PROCESS>GMAH.DLL</PROCESS>
- <PROCESS>DEPF.DLL</PROCESS>
- <PROCESS>FHAE.DLL</PROCESS>
- <PROCESS>SBOV.DLL</PROCESS>
- <PROCESS>FFSNZM.DLL</PROCESS>
- <PROCESS>XWDIIFMC.DLL</PROCESS>
- <PROCESS>VBTJAQOL.DLL</PROCESS>
- <PROCESS>VTVEOBON.DLL</PROCESS>
- <PROCESS>IEEL32.DLL</PROCESS>
- <PROCESS>TBWUGCVM.DLL</PROCESS>
- <PROCESS>BGEPRIUB.DLL</PROCESS>
- <PROCESS>XLYOIFKR.DLL</PROCESS>
- <PROCESS>QEUGQVJ.DLL</PROCESS>
- <PROCESS>7MAV2Q71.DLL</PROCESS>
- <PROCESS>8Q9SE91R.DLL</PROCESS>
- <PROCESS>C0OWSGN2.DLL</PROCESS>
- <PROCESS>BW3AMWYL.DLL</PROCESS>
- <PROCESS>69KLV9NV.DLL</PROCESS>
- <PROCESS>ONKDDD.DLL</PROCESS>
- <PROCESS>STHP.DLL</PROCESS>
- <PROCESS>FHIF.DLL</PROCESS>
- <PROCESS>OIBLBM.DLL</PROCESS>
- <PROCESS>IGNE.DLL</PROCESS>
- <PROCESS>SDKQV.DLL</PROCESS>
- <PROCESS>JAVAEL.DLL</PROCESS>
- <PROCESS>JAVADL.DLL</PROCESS>
- <PROCESS>GFEFB.DLL</PROCESS>
- <PROCESS>JNIKGC.DLL</PROCESS>
- <PROCESS>INBF.DLL</PROCESS>
- <PROCESS>JAVAMW32.DLL</PROCESS>
- <PROCESS>PNGNLE.DLL</PROCESS>
- <PROCESS>PGAXNATV.DLL</PROCESS>
- <PROCESS>HBRPPUOG.DLL</PROCESS>
- <PROCESS>IHOF.DLL</PROCESS>
- <PROCESS>MEDCC.DLL</PROCESS>
- <PROCESS>EMDK.DLL</PROCESS>
- <PROCESS>2NU0BQF6.DLL</PROCESS>
- <PROCESS>421A1492.DLL</PROCESS>
- <PROCESS>GS0H6CWF.DLL</PROCESS>
- <PROCESS>ZTBOT.DLL</PROCESS>
- <PROCESS>MFCUL32.DLL</PROCESS>
- <PROCESS>DNGNGD.DLL</PROCESS>
- <PROCESS>OIHB.DLL</PROCESS>
- <PROCESS>2908YK0S.DLL</PROCESS>
- <PROCESS>2OG4EMGL.DLL</PROCESS>
- <PROCESS>7CQV7SNM.DLL</PROCESS>
- <PROCESS>7H7K1O8A.DLL</PROCESS>
- <PROCESS>KRLLYECOO.DLL</PROCESS>
- <PROCESS>ILDNNTA.DLL</PROCESS>
- <PROCESS>CRBY.DLL</PROCESS>
- <PROCESS>NETCGF.DLL</PROCESS>
- <PROCESS>DLQRJKSB.DLL</PROCESS>
- <PROCESS>NHPK.DLL</PROCESS>
- <PROCESS>EFMK.DLL</PROCESS>
- <PROCESS>CPJE.DLL</PROCESS>
- <PROCESS>YPJGZKJ.DLL</PROCESS>
- <PROCESS>CDOSBYS.DLL</PROCESS>
- <PROCESS>IJINCO.DLL</PROCESS>
- <PROCESS>HONEIZK.DLL</PROCESS>
- <PROCESS>NPOB.DLL</PROCESS>
- <PROCESS>JGTR6Y46.DLL</PROCESS>
- <PROCESS>IDVGBPAK.DLL</PROCESS>
- <PROCESS>IOZKK.DLL</PROCESS>
- <PROCESS>WJJTWT.DLL</PROCESS>
- <PROCESS>SDKSV32.DLL</PROCESS>
- <PROCESS>KDOF.DLL</PROCESS>
- <PROCESS>BOY57W3E.DLL</PROCESS>
- <PROCESS>OQMWQGQL.DLL</PROCESS>
- <PROCESS>BJFDC.DLL</PROCESS>
- <PROCESS>HOM.DLL</PROCESS>
- <PROCESS>OA8ANFBF.DLL</PROCESS>
- <PROCESS>NDJP.DLL</PROCESS>
- <PROCESS>MSVZQ.DLL</PROCESS>
- <PROCESS>DSKRFUOUI.DLL</PROCESS>
- <PROCESS>HTASS.DLL</PROCESS>
- <PROCESS>DBLD.DLL</PROCESS>
- <PROCESS>MSW.DLL</PROCESS>
- <PROCESS>SHMGT.DLL</PROCESS>
- <PROCESS>KTWWK.DLL</PROCESS>
- <PROCESS>LDCC.DLL</PROCESS>
- <PROCESS>RBOOTVID.DLL</PROCESS>
- <PROCESS>QHPLASNU.DLL</PROCESS>
- <PROCESS>KEPK.DLL</PROCESS>
- <PROCESS>HKJI.DLL</PROCESS>
- <PROCESS>MFCFN32.DLL</PROCESS>
- <PROCESS>ATWQIU.DLL</PROCESS>
- <PROCESS>APIZG32.DLL</PROCESS>
- <PROCESS>ATLWA.DLL</PROCESS>
- <PROCESS>BCGE.DLL</PROCESS>
- <PROCESS>BEAF.DLL</PROCESS>
- <PROCESS>BEB.DLL</PROCESS>
- <PROCESS>BEEEKA.DLL</PROCESS>
- <PROCESS>BHN.DLL</PROCESS>
- <PROCESS>BOCK.DLL</PROCESS>
- <PROCESS>CEGUGEC.DLL</PROCESS>
- <PROCESS>CEJD.DLL</PROCESS>
- <PROCESS>CGGK.DLL</PROCESS>
- <PROCESS>CGPFA.DLL</PROCESS>
- <PROCESS>CHIOB.DLL</PROCESS>
- <PROCESS>CHLB.DLL</PROCESS>
- <PROCESS>CJKH.DLL</PROCESS>
- <PROCESS>CJOKDBA.DLL</PROCESS>
- <PROCESS>CLBED.DLL</PROCESS>
- <PROCESS>CLGEIDA.DLL</PROCESS>
- <PROCESS>CMLI.DLL</PROCESS>
- <PROCESS>CMPBGK32.DLL</PROCESS>
- <PROCESS>COGIBB.DLL</PROCESS>
- <PROCESS>COP.DLL</PROCESS>
- <PROCESS>JAVASP32.DLL</PROCESS>
- <PROCESS>CRLB32.DLL</PROCESS>
- <PROCESS>CRSN32.DLL</PROCESS>
- <PROCESS>CUBA.DLL</PROCESS>
- <PROCESS>D3MF32.DLL</PROCESS>
- <PROCESS>D3ZK.DLL</PROCESS>
- <PROCESS>D3ZQ32.DLL</PROCESS>
- <PROCESS>DCBH.DLL</PROCESS>
- <PROCESS>DGKMCCA.DLL</PROCESS>
- <PROCESS>DIGBFYU.DLL</PROCESS>
- <PROCESS>DIGEWOTK.DLL</PROCESS>
- <PROCESS>DJKF.DLL</PROCESS>
- <PROCESS>DKR.DLL</PROCESS>
- <PROCESS>DMHO.DLL</PROCESS>
- <PROCESS>DODJ.DLL</PROCESS>
- <PROCESS>DPAN.DLL</PROCESS>
- <PROCESS>DPP.DLL</PROCESS>
- <PROCESS>DRBLDGRUTSH.DLL</PROCESS>
- <PROCESS>EBFL.DLL</PROCESS>
- <PROCESS>ECFPJA.DLL</PROCESS>
- <PROCESS>EDC.DLL</PROCESS>
- <PROCESS>EDI.DLL</PROCESS>
- <PROCESS>EDKC.DLL</PROCESS>
- <PROCESS>EEGXRTSC.DLL</PROCESS>
- <PROCESS>EEIDMA.DLL</PROCESS>
- <PROCESS>EEMBCJD.DLL</PROCESS>
- <PROCESS>EHLL.DLL</PROCESS>
- <PROCESS>EIOM.DLL</PROCESS>
- <PROCESS>EKJB.DLL</PROCESS>
- <PROCESS>EKJMDCC.DLL</PROCESS>
- <PROCESS>EOMP.DLL</PROCESS>
- <PROCESS>EPFM.DLL</PROCESS>
- <PROCESS>ESMOM.DLL</PROCESS>
- <PROCESS>FADO.DLL</PROCESS>
- <PROCESS>FBGM.DLL</PROCESS>
- <PROCESS>FDIA.DLL</PROCESS>
- <PROCESS>FGSUSD.DLL</PROCESS>
- <PROCESS>FIIL.DLL</PROCESS>
- <PROCESS>FILO.DLL</PROCESS>
- <PROCESS>FIS.DLL</PROCESS>
- <PROCESS>FKEE.DLL</PROCESS>
- <PROCESS>FMBGPL.DLL</PROCESS>
- <PROCESS>FMDI.DLL</PROCESS>
- <PROCESS>FOEMAJ.DLL</PROCESS>
- <PROCESS>PGFC.DLL</PROCESS>
- <PROCESS>FRM20ENU.DLL</PROCESS>
- <PROCESS>FSMR.DLL</PROCESS>
- <PROCESS>FSZYEBHW.DLL</PROCESS>
- <PROCESS>FTBTVFAQ.DLL</PROCESS>
- <PROCESS>GAPC.DLL</PROCESS>
- <PROCESS>GBAAEL.DLL</PROCESS>
- <PROCESS>GBKICN.DLL</PROCESS>
- <PROCESS>GDDB.DLL</PROCESS>
- <PROCESS>GHFC.DLL</PROCESS>
- <PROCESS>GHNK.DLL</PROCESS>
- <PROCESS>GLCFCA.DLL</PROCESS>
- <PROCESS>GLOF.DLL</PROCESS>
- <PROCESS>GOKI.DLL</PROCESS>
- <PROCESS>GUEQX.DLL</PROCESS>
- <PROCESS>GWLLMP.DLL</PROCESS>
- <PROCESS>HACPBF.DLL</PROCESS>
- <PROCESS>HDEM.DLL</PROCESS>
- <PROCESS>HEDP.DLL</PROCESS>
- <PROCESS>HEKN.DLL</PROCESS>
- <PROCESS>HGLLI.DLL</PROCESS>
- <PROCESS>HGRX.DLL</PROCESS>
- <PROCESS>HHM.DLL</PROCESS>
- <PROCESS>HICE.DLL</PROCESS>
- <PROCESS>HKAJ.DLL</PROCESS>
- <PROCESS>HKD.DLL</PROCESS>
- <PROCESS>HMI.DLL</PROCESS>
- <PROCESS>HMOZIJ.DLL</PROCESS>
- <PROCESS>HZLPRRXT.DLL</PROCESS>
- <PROCESS>IAAIWUN.DLL</PROCESS>
- <PROCESS>ICCTRZ.DLL</PROCESS>
- <PROCESS>IECW.DLL</PROCESS>
- <PROCESS>IEEA.DLL</PROCESS>
- <PROCESS>IEFQ32.DLL</PROCESS>
- <PROCESS>IEIH.DLL</PROCESS>
- <PROCESS>IEIS32.DLL</PROCESS>
- <PROCESS>IESS32.DLL</PROCESS>
- <PROCESS>IEYG32.DLL</PROCESS>
- <PROCESS>IEZJ32.DLL</PROCESS>
- <PROCESS>IFAHJDA.DLL</PROCESS>
- <PROCESS>IGUN.DLL</PROCESS>
- <PROCESS>IHIB.DLL</PROCESS>
- <PROCESS>IIGH.DLL</PROCESS>
- <PROCESS>IIH.DLL</PROCESS>
- <PROCESS>IJBCOH.DLL</PROCESS>
- <PROCESS>IJSZLKV.DLL</PROCESS>
- <PROCESS>IKCGH.DLL</PROCESS>
- <PROCESS>IMMH.DLL</PROCESS>
- <PROCESS>IPEN.DLL</PROCESS>
- <PROCESS>IPIH.DLL</PROCESS>
- <PROCESS>JDFC.DLL</PROCESS>
- <PROCESS>JDM.DLL</PROCESS>
- <PROCESS>JEOJ.DLL</PROCESS>
- <PROCESS>JGPL4H00.DLL</PROCESS>
- <PROCESS>JIPF.DLL</PROCESS>
- <PROCESS>JJAI.DLL</PROCESS>
- <PROCESS>JJDIBDA.DLL</PROCESS>
- <PROCESS>JJPO.DLL</PROCESS>
- <PROCESS>JLCM.DLL</PROCESS>
- <PROCESS>JODP.DLL</PROCESS>
- <PROCESS>JOMA.DLL</PROCESS>
- <PROCESS>JPIC.DLL</PROCESS>
- <PROCESS>JZYBQWT.DLL</PROCESS>
- <PROCESS>KBDK.DLL</PROCESS>
- <PROCESS>KEDO.DLL</PROCESS>
- <PROCESS>KGPF.DLL</PROCESS>
- <PROCESS>KIBL.DLL</PROCESS>
- <PROCESS>KJHIBICK.DLL</PROCESS>
- <PROCESS>KKLC.DLL</PROCESS>
- <PROCESS>KMKB.DLL</PROCESS>
- <PROCESS>KPLPYQ.DLL</PROCESS>
- <PROCESS>KSPM.DLL</PROCESS>
- <PROCESS>LAAOYUM.DLL</PROCESS>
- <PROCESS>LAFK.DLL</PROCESS>
- <PROCESS>LEHE.DLL</PROCESS>
- <PROCESS>PZKNY.DLL</PROCESS>
- <PROCESS>WER3548.DLL</PROCESS>
- <PROCESS>BDIEWQKC.DLL</PROCESS>
- <PROCESS>AONGSEUN.DLL</PROCESS>
- <PROCESS>AHPWCEPL.DLL</PROCESS>
- <PROCESS>MSHUC.DLL</PROCESS>
- <PROCESS>ZYAEZZBO.DLL</PROCESS>
- <PROCESS>YLGCZ.DLL</PROCESS>
- <PROCESS>XWLOJHBN.DLL</PROCESS>
- <PROCESS>TEFXEFQI.DLL</PROCESS>
- <PROCESS>QDNMPXME.DLL</PROCESS>
- <PROCESS>QCGTHVRR.DLL</PROCESS>
- <PROCESS>LYXRGVRS.DLL</PROCESS>
- <PROCESS>LNDVALRG.DLL</PROCESS>
- <PROCESS>ISXJYUFL.DLL</PROCESS>
- <PROCESS>HRHDRBQU.DLL</PROCESS>
- <PROCESS>FGRIQQMS.DLL</PROCESS>
- <PROCESS>MFCTY32.DLL</PROCESS>
- <PROCESS>HBAO.DLL</PROCESS>
- <PROCESS>GPJ.DLL</PROCESS>
- <PROCESS>BAPP.DLL</PROCESS>
- <PROCESS>TFCLICK.DLL</PROCESS>
- <PROCESS>AJHK.DLL</PROCESS>
- <PROCESS>LNCD.DLL</PROCESS>
- <PROCESS>NETBC32.DLL</PROCESS>
- <PROCESS>FFHH.DLL</PROCESS>
- <PROCESS>OFFC.DLL</PROCESS>
- <PROCESS>REQ.DAT</PROCESS>
- <PROCESS>IDAFBAA.DLL</PROCESS>
- <PROCESS>GNLM.DLL</PROCESS>
- <PROCESS>GOAH.DLL</PROCESS>
- <PROCESS>T1T304R.DLL</PROCESS>
- <PROCESS>O2DPBZ3.DLL</PROCESS>
- <PROCESS>JOEJA.DLL</PROCESS>
- <PROCESS>APPLL.DLL</PROCESS>
- <PROCESS>ADDMU32.DLL</PROCESS>
- <PROCESS>DKJD.DLL</PROCESS>
- <PROCESS>FLFMDM.DLL</PROCESS>
- <PROCESS>DBKF.DLL</PROCESS>
- <PROCESS>WINLX32.DLL</PROCESS>
- <PROCESS>MNGP.DLL</PROCESS>
- <PROCESS>NTDI.DLL</PROCESS>
- <PROCESS>SDKDK32.DLL</PROCESS>
- <PROCESS>YHINUPXT.DLL</PROCESS>
- <PROCESS>NAIG.DLL</PROCESS>
- <PROCESS>UUWMN.DLL</PROCESS>
- <PROCESS>ALGA.DLL</PROCESS>
- <PROCESS>PTFBAC.DAT</PROCESS>
- <PROCESS>DECL.DLL</PROCESS>
- <PROCESS>IPVW32.DLL</PROCESS>
- <PROCESS>IDLD.DLL</PROCESS>
- <PROCESS>GIKC.DLL</PROCESS>
- <PROCESS>NIDKBA.DLL</PROCESS>
- <PROCESS>AEEO.DLL</PROCESS>
- <PROCESS>AOSOPOB.DLL</PROCESS>
- <PROCESS>BLK.DLL</PROCESS>
- <PROCESS>EGDC.DLL</PROCESS>
- <PROCESS>JLIG.DLL</PROCESS>
- <PROCESS>MBBH.DLL</PROCESS>
- <PROCESS>XCWYRO.DLL</PROCESS>
- <PROCESS>WINEE.DLL</PROCESS>
- <PROCESS>APPLR.DLL</PROCESS>
- <PROCESS>LTMQXQCM.DLL</PROCESS>
- <PROCESS>TUSCMOD.DLL</PROCESS>
- <PROCESS>OLEACCHC.DLL</PROCESS>
- <PROCESS>IWAUH.DLL</PROCESS>
- <PROCESS>MSAJO.DLL</PROCESS>
- <PROCESS>ARXOMLFP.DLL</PROCESS>
- <PROCESS>JCDAPJ.DLL</PROCESS>
- <PROCESS>JFIM.DLL</PROCESS>
- <PROCESS>GHIE.DLL</PROCESS>
- <PROCESS>QCQPSR.DLL</PROCESS>
- <PROCESS>VZMTLP.DLL</PROCESS>
- <PROCESS>MSJD.DLL</PROCESS>
- <PROCESS>MBHD.DLL</PROCESS>
- <PROCESS>MACJ.DLL</PROCESS>
- <PROCESS>JTDGYQ.DLL</PROCESS>
- <PROCESS>OBGOLJJ.DLL</PROCESS>
- <PROCESS>ICKL.DLL</PROCESS>
- <PROCESS>ATLMC.DLL</PROCESS>
- <PROCESS>MONMGM.DLL</PROCESS>
- <PROCESS>DFCDJDD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6AA93E57-E847-2CED-8753-60550DF17F49}</CLSID>
- <CLSID>{F4B3567E-170E-BEAD-55E9-FF12B1A3AEB4}</CLSID>
- <CLSID>{F2A4407B-FFBC-4A1F-A18A-0F68C3E0FC9E}</CLSID>
- <CLSID>{6157B08E-3BF8-9446-A991-A3FC7BC89E85}</CLSID>
- <CLSID>{50C4E0A1-73F2-11D9-9924-0002E57311C8}</CLSID>
- <CLSID>{29A50220-73F2-11D9-9924-00022AB5ED6C}</CLSID>
- <CLSID>{3CCFB632-ADDA-4957-8C74-D9D1553901B8}</CLSID>
- <CLSID>{11CEFA27-5AE9-46CB-B791-738C242B4761}</CLSID>
- <CLSID>{A3E9059A-4253-4912-9585-878782F24B80}</CLSID>
- <CLSID>{55955EDD-0121-4E62-AE7B-CB0FD092659D}</CLSID>
- <CLSID>{BD125B49-882F-4FD9-8E92-9FBFA2AE0250}</CLSID>
- <CLSID>{950C2918-C2AE-EC3B-70D0-F5A2DB7DE92F}</CLSID>
- <CLSID>{B1E91D2A-1E7A-46FC-A680-EDBEF1D42EE4}</CLSID>
- <CLSID>{447FBE80-C3FB-4835-9300-AFF7C6FB7939}</CLSID>
- <CLSID>{58DF410E-9DC0-035F-0DAA-CFF9BEEF806E}</CLSID>
- <CLSID>{5A21BC0B-AA89-4EC7-9365-82C7101731DC}</CLSID>
- <CLSID>{4D512E7A-1BB0-4405-00B1-77335BD81BE7}</CLSID>
- <CLSID>{00962F9C-E575-B58C-7B61-EADC4962B49B}</CLSID>
- <CLSID>{4410D8C5-0277-7086-4641-DD5178D4D6ED}</CLSID>
- <CLSID>{8B13D86A-93CA-4791-A652-54E2FE3428D7}</CLSID>
- <CLSID>{3C2AFE68-6CCF-A502-CC72-418444664D7A}</CLSID>
- <CLSID>{C964E137-AC20-F832-469A-869B7E738F46}</CLSID>
- <CLSID>{8B59E7A0-74E8-11D9-94FD-0050FC97BE21}</CLSID>
- <CLSID>{B9EFFEA4-AF76-9EE9-5DD8-18EFE60BA884}</CLSID>
- <CLSID>{5C5AF1C1-7514-11D9-B92E-0080909E113E}</CLSID>
- <CLSID>{494F9AA5-2482-47E6-86F3-4B8E32B07EB6}</CLSID>
- <CLSID>{AFFEDC41-C8F0-42F4-90A0-1B502C0FDB87}</CLSID>
- <CLSID>{112AD30F-2903-4D1A-B963-BCA8BC60F37D}</CLSID>
- <CLSID>{37F6E521-7657-11D9-9D64-0004C2778B2B}</CLSID>
- <CLSID>{51219589-FE9D-A7E2-3F0C-070910E5C08A}</CLSID>
- <CLSID>{3AAD312F-B917-0FB6-8753-60550BF3794B}</CLSID>
- <CLSID>{4F8DAAC2-370D-47F5-2974-38B60F1EF396}</CLSID>
- <CLSID>{A6BACA21-D950-11D8-9F09-0001CCA0918D}</CLSID>
- <CLSID>{E0DE07B5-173A-9E15-4265-8EB6D5A181DF}</CLSID>
- <CLSID>{086FD2F9-26D5-4053-BDB6-EC3F1E673059}</CLSID>
- <CLSID>{6518F4B3-A15F-E14C-71F3-61A49FC2A684}</CLSID>
- <CLSID>{5664B81B-02FB-0A09-885C-2D27B0E3B8B3}</CLSID>
- <CLSID>{407FFCD2-654F-817E-A2EE-B535B9FBC95D}</CLSID>
- <CLSID>{C8BFB1F8-6B02-5880-8993-6C955AAC22D9}</CLSID>
- <CLSID>{A3541D1C-ADF1-DE22-D969-FB1DF3134591}</CLSID>
- <CLSID>{BDC4D804-63BC-533D-EC5E-4F76611D5097}</CLSID>
- <CLSID>{9CAEB6DD-952A-4A3D-986F-54D42D7FE6E3}</CLSID>
- <CLSID>{291E1ABA-FD5D-CBDD-0A40-8ECABAA19ECE}</CLSID>
- <CLSID>{88AE5BAB-3DC7-9717-34AB-BAC95A1C967A}</CLSID>
- <CLSID>{E3D0F46E-69AD-6B5F-DA5B-3EE6098E59B9}</CLSID>
- <CLSID>{B4E11900-F830-4B94-A829-F33D13A017FF}</CLSID>
- <CLSID>{0262ABF6-020B-49AD-ABAE-37B60D3740DE}</CLSID>
- <CLSID>{13DF4125-BA16-7ABC-D50B-66550D807F3B}</CLSID>
- <CLSID>{7442D39A-CCEA-4346-9A6C-7C5519D9886C}</CLSID>
- <CLSID>{DE3BEBDB-AEE7-4277-8B6E-4EEFFA9508AE}</CLSID>
- <CLSID>{B4073A39-90F8-4BC2-8459-84CA81B45037}</CLSID>
- <CLSID>{1A8DD8BA-3651-3785-2974-38B6091FF390}</CLSID>
- <CLSID>{96D1DC36-35A0-3478-892B-4AE60EFE5FCF}</CLSID>
- <CLSID>{49A74673-E914-0EBA-8720-10550DD22D6C}</CLSID>
- <CLSID>{36802CAF-4935-6B33-1F9E-5464B4EF1A9E}</CLSID>
- <CLSID>{4FAB4A29-9046-71CC-8020-17550EAE7E1E}</CLSID>
- <CLSID>{A771213E-BCAA-47E6-BF98-36D9049B7ADF}</CLSID>
- <CLSID>{19C15D9B-ED76-52EE-036B-5591AF55B4A5}</CLSID>
- <CLSID>{B8A2CC57-5B90-2918-B25C-5A17206524C3}</CLSID>
- <CLSID>{E390C857-0198-43B3-BD9C-63F6AFD8955F}</CLSID>
- <CLSID>{FD9794E7-7653-4081-A684-9DF55F9A0B59}</CLSID>
- <CLSID>{D97EF13D-5746-4EA8-AD5C-9EE95E60016F}</CLSID>
- <CLSID>{B8A9A425-D3A7-4724-92D4-691BBB73159E}</CLSID>
- <CLSID>{DD33DD18-4D26-B41E-13DA-43F55E371DD6}</CLSID>
- <CLSID>{9FE58464-39D7-5B07-D21D-4B861E4822C1}</CLSID>
- <CLSID>{5E1A8160-1AF5-1E7F-D6D8-1034E524B4CE}</CLSID>
- <CLSID>{F80F1067-D3F2-DC77-D51B-8F1D806519B4}</CLSID>
- <CLSID>{E45E706D-BDAF-8B0B-89DE-E2ABA9710591}</CLSID>
- <CLSID>{EAA2B603-2ACB-7514-B02F-5A17226C24CF}</CLSID>
- <CLSID>{1A68F868-8DB3-43BB-A0E8-E9E365244F72}</CLSID>
- <CLSID>{095D1D61-4A5E-11EA-864B-00A0C1BB7308}</CLSID>
- <CLSID>{124D0F11-4118-F197-B2B9-2911BC897B9D}</CLSID>
- <CLSID>{77C3B296-B2C7-04D1-9FA9-344B470380E8}</CLSID>
- <CLSID>{55E02D39-4AB0-4906-9ABF-179C5ECD5188}</CLSID>
- <CLSID>{E6297A1C-B6AD-B056-DF8F-E3ABDB765096}</CLSID>
- <CLSID>{0B9BEF6F-48A7-B4E4-9373-E344FC57DCEA}</CLSID>
- <CLSID>{A455DF6A-761C-84AC-C452-CF3486D353ED}</CLSID>
- <CLSID>{ABC9913D-53DC-6D09-D93D-79C54E7C10E1}</CLSID>
- <CLSID>{943E6173-A0CE-FA3B-E06A-F87A94B20D92}</CLSID>
- <CLSID>{B7B890C3-6D1A-B040-77E8-04DF4910E570}</CLSID>
- <CLSID>{6AAB6B04-C415-7995-8652-64550DF12A4A}</CLSID>
- <CLSID>{C344947C-6283-4D6C-81AB-761B69E29925}</CLSID>
- <CLSID>{943D6C03-DDB3-CF31-B51A-8B7AE6B10D94}</CLSID>
- <CLSID>{1DF3672F-CE61-41B7-8724-12550EA62C14}</CLSID>
- <CLSID>{49D83270-C910-2FB2-8000-60557EF3731F}</CLSID>
- <CLSID>{B74EDC98-383A-487C-863E-6359D052AEF4}</CLSID>
- <CLSID>{8654B9C1-722B-11D9-918F-4445C9EE1796}</CLSID>
- <CLSID>{0F9561D0-03B2-44A3-89A6-E95E417CBA25}</CLSID>
- <CLSID>{7EB43794-8A80-4D4A-8773-EDDDDDE68E83}</CLSID>
- <CLSID>{2F08EF03-8C25-44E3-A3B8-C3DC1D9D68AA}</CLSID>
- <CLSID>{F9D5A275-18ED-693B-BFAD-106470DA1F92}</CLSID>
- <CLSID>{053F9C62-52F7-072D-8C2D-2E27C391BCC7}</CLSID>
- <CLSID>{594CDEF4-5CD7-4357-80FB-FC482E616A24}</CLSID>
- <CLSID>{B75F75B8-93F3-429D-FF34-660B206D897A}</CLSID>
- <CLSID>{928234F6-C5C4-2850-6A67-BFEE94276F48}</CLSID>
- <CLSID>{F7AB9706-38AF-4272-97B4-E5060B46A00E}</CLSID>
- <CLSID>{FFD08327-4A95-3210-B5D9-1B640CAA18E8}</CLSID>
- <CLSID>{12FBE009-EFF0-45E9-B51E-BDE0C515A4A0}</CLSID>
- <CLSID>{BA997092-5DFF-A91F-6516-A449FC336452}</CLSID>
- <CLSID>{BA97183C-849F-18AC-10FF-F7B7B52D6B07}</CLSID>
- <CLSID>{BDDABD52-6460-D76F-0078-B26F3AE89F02}</CLSID>
- <CLSID>{091FB995-0A55-208D-2887-23879B83E9C8}</CLSID>
- <CLSID>{A1E404E1-7C0B-11D9-918F-0002DF25BBA7}</CLSID>
- <CLSID>{9CC8F542-1A40-D18B-FB14-9CD9B4908857}</CLSID>
- <CLSID>{567403C8-7446-AA9B-9A5C-8F3AA61EBBEA}</CLSID>
- <CLSID>{8C33D81A-6010-44E8-9A22-9B1890489E8E}</CLSID>
- <CLSID>{9AC961A7-A241-83F3-5E89-D226FCF7B906}</CLSID>
- <CLSID>{A8C8A388-61C0-F0D9-91D0-47615F2F6A9B}</CLSID>
- <CLSID>{61B3DE01-7C3C-11D9-9B99-0080BF8F791A}</CLSID>
- <CLSID>{2350F746-0B16-47B3-AE68-0DC2207CDD20}</CLSID>
- <CLSID>{40D569C1-F9AA-178A-455D-97CE4369C208}</CLSID>
- <CLSID>{13A1197C-ED6F-7DC0-D70F-62550DAB7047}</CLSID>
- <CLSID>{046FB3C8-2805-20FF-2CF6-2387EBF8EAB9}</CLSID>
- <CLSID>{5BCFFDC1-7C91-11D9-BA24-00D09297E28D}</CLSID>
- <CLSID>{044FB2C1-0001-09FA-28F6-20879884BC9C}</CLSID>
- <CLSID>{40FADE99-4C75-67D5-7873-3CB6091FF1CE}</CLSID>
- <CLSID>{FDD5F477-40B8-4139-B7D3-1B6477AC4F9F}</CLSID>
- <CLSID>{0FB221A9-2FB0-EFBC-F7D2-791B8A34B8AE}</CLSID>
- <CLSID>{76EB40F5-0241-427F-D677-7046D166A069}</CLSID>
- <CLSID>{F0813CD2-E65F-5132-5A80-86B9F32D6BC4}</CLSID>
- <CLSID>{616BE3BB-5355-03D9-27E6-0495BFA58997}</CLSID>
- <CLSID>{8977E004-7E92-11D9-A530-F3E7F25E3E0A}</CLSID>
- <CLSID>{CA676071-A1C0-F214-B56D-F97AE5B10E94}</CLSID>
- <CLSID>{9A5C98A1-7AB1-11D9-BF80-00309B5510D2}</CLSID>
- <CLSID>{4EA93207-EF11-7A92-8753-605509A47F1E}</CLSID>
- <CLSID>{87FA4641-E879-11D4-8DEA-0010233CE377}</CLSID>
- <CLSID>{29C8B296-FAF9-4050-9029-AB958BF22EE4}</CLSID>
- <CLSID>{AE59401B-FDF7-8C75-D919-8B1D8B1518C3}</CLSID>
- <CLSID>{3BAA3C07-9416-0DE9-845A-61550DD72834}</CLSID>
- <CLSID>{1DF43517-D8A9-842E-80BE-F40A7209F1CC}</CLSID>
- <CLSID>{70FBC416-2AED-4941-A524-BFF1C2ADBFF2}</CLSID>
- <CLSID>{939BA3C1-C6BB-41AB-9B2C-EA0F63A6E022}</CLSID>
- <CLSID>{083EB09B-0859-2883-2EF0-23879EF9BCEA}</CLSID>
- <CLSID>{398CF54E-72B6-49BB-B852-F6390069FCAD}</CLSID>
- <CLSID>{D4B0DA86-7CC2-11D9-B29C-004014A24FFD}</CLSID>
- <CLSID>{784DE198-5958-5E8B-2EF0-57879EF4BECF}</CLSID>
- <CLSID>{FB350E21-7C26-11D9-9FEF-000475E40761}</CLSID>
- <CLSID>{9FA30BD9-6EA9-6EDF-1A94-F9A250E63880}</CLSID>
- <CLSID>{7F5C6F61-7ECD-11D9-8928-000B8DD97DEE}</CLSID>
- <CLSID>{C4C627E1-7A85-11D9-87EA-00084B91431B}</CLSID>
- <CLSID>{00DA2AA1-7D25-11D9-945D-00004A1981DB}</CLSID>
- <CLSID>{114C48A0-7F55-11D9-A01F-00403123D67E}</CLSID>
- <CLSID>{5BA26EE0-7E22-11D9-97C9-000629775C67}</CLSID>
- <CLSID>{E0C70E40-6BB3-11D9-A13A-444553540000}</CLSID>
- <CLSID>{091CCA41-4F50-11D9-A13A-44451FB0A1AE}</CLSID>
- <CLSID>{5B12AE81-7F81-11D9-80A8-00406DDDD73C}</CLSID>
- <CLSID>{AEAA9725-A1C0-4C71-813E-7B0A8DE3A765}</CLSID>
- <CLSID>{049ACC99-8BBC-45B7-AE24-26DA49496E6A}</CLSID>
- <CLSID>{4C18C706-3C9C-0A0E-75BD-8958BD9CD254}</CLSID>
- <CLSID>{6AF005A3-AB9D-AA25-A620-35F3DD52A8B7}</CLSID>
- <CLSID>{E98A61B1-1123-486F-96FD-FC0FEA8F5F25}</CLSID>
- <CLSID>{756F39C8-AE2D-8EAC-5942-FBCACBD59DCE}</CLSID>
- <CLSID>{E7E6FC79-319E-1766-E92D-3C7610635196}</CLSID>
- <CLSID>{6E8E637F-E264-07E7-8751-65557EAC7536}</CLSID>
- <CLSID>{91DA7281-BFB3-472C-9FAA-B5667F55ABC6}</CLSID>
- <CLSID>{5B5C5C6E-2BFD-4297-AC5D-512C3653DB51}</CLSID>
- <CLSID>{B6C3CB92-4733-474D-8934-A7D0C3BA5B95}</CLSID>
- <CLSID>{0905A8B3-F94C-441B-82E3-0E454C301E21}</CLSID>
- <CLSID>{295B737D-D10B-475B-980A-C32BC768C341}</CLSID>
- <CLSID>{42D19966-7B46-11D9-B7C3-F82B9C753739}</CLSID>
- <CLSID>{C4666B74-8697-A167-B56D-F97AE5B05C9D}</CLSID>
- <CLSID>{29FA3F79-9F1D-8DF8-A459-FF49FD02FC72}</CLSID>
- <CLSID>{6C83DF70-FF01-49FF-8BB8-1D80DB741C32}</CLSID>
- <CLSID>{ADD48D06-9F2B-47E9-D513-4941C64B5868}</CLSID>
- <CLSID>{2AF43CE3-5084-EDEA-E47E-202CDEEAFF2E}</CLSID>
- <CLSID>{4CA0143C-FEFB-956A-879D-840A017BA6BE}</CLSID>
- <CLSID>{B93A6A3D-9B7D-4B3D-F50A-8450933B13E9}</CLSID>
- <CLSID>{47AEE64C-5AEA-4ED8-103A-64D56785E44D}</CLSID>
- <CLSID>{4A5ABB53-102D-C19C-B368-482572DCB536}</CLSID>
- <CLSID>{C6A8D11B-3BA5-330F-DA2B-3DE67C885FC8}</CLSID>
- <CLSID>{2B606031-810B-11D9-A942-00C0FBFBB4DB}</CLSID>
- <CLSID>{1E8C7F49-45E8-4861-875A-4D4728FCC01F}</CLSID>
- <CLSID>{3CD76228-9E4B-7E98-D170-6C550DF47C3B}</CLSID>
- <CLSID>{EDD5FF32-14A2-6F7E-8F5B-31E67C8F5AEF}</CLSID>
- <CLSID>{B1DBFA33-43AD-6B7F-8D5B-31E67C8F5AEF}</CLSID>
- <CLSID>{3ADC6E7E-CB43-789B-D770-6C550DF47D39}</CLSID>
- <CLSID>{4D9F3B99-4C2C-4B83-AF52-D030E73E022E}</CLSID>
- <CLSID>{D01EB607-FCB6-D9F9-F253-E432410DA962}</CLSID>
- <CLSID>{3E2450C4-7F32-11D9-93E6-00E0644DBC8A}</CLSID>
- <CLSID>{354BA804-7E0F-11D9-BE46-00D04A85E75E}</CLSID>
- <CLSID>{EF3F1C7D-511A-0A1F-2915-8BF8D1F23F0D}</CLSID>
- <CLSID>{1CA21262-A786-C308-80C8-F90A0479A69B}</CLSID>
- <CLSID>{569A1484-6182-4CC7-AF83-8F9EF1585C20}</CLSID>
- <CLSID>{79B38A76-EFF6-46BB-B3E0-1DEFAF2A8713}</CLSID>
- <CLSID>{F7021607-4C75-4841-8622-6E8051437B8B}</CLSID>
- <CLSID>{20F1FA89-12C8-4922-A5E5-8346B7C6C603}</CLSID>
- <CLSID>{4E7861F2-6158-4871-BDD7-8AE076F1AA89}</CLSID>
- <CLSID>{17223ACE-5BAA-4CE6-862E-6FDD1B24A6CE}</CLSID>
- <CLSID>{7626F346-8956-4D15-86B6-4F16E39BF7A8}</CLSID>
- <CLSID>{0A99795D-2295-4B5F-A819-AB587086F5C7}</CLSID>
- <CLSID>{30A13D51-C235-009D-8357-65557FD52918}</CLSID>
- <CLSID>{F4808A5F-43BB-1E38-B5DC-116477AC1BE5}</CLSID>
- <CLSID>{39A83652-9315-08C1-8753-60550DF37F44}</CLSID>
- <CLSID>{3BA50E07-81A5-11D9-A5C8-C0B6A2857B7B}</CLSID>
- <CLSID>{CD1F8703-D1A5-4645-BA71-45E3C0773DF3}</CLSID>
- <CLSID>{3B4B3573-62B1-4BC3-945A-BEF4E13C6EFB}</CLSID>
- <CLSID>{485533D5-2F64-4C8A-A47E-4644C08C645D}</CLSID>
- <CLSID>{3FB80C61-79DD-11D9-88C9-52545C26091D}</CLSID>
- <CLSID>{E90C0AC2-F2C4-404A-B8EC-0ACC193FAB2F}</CLSID>
- <CLSID>{1B849856-C2B0-C16F-7AA2-AF1A44A6BEDA}</CLSID>
- <CLSID>{1C520161-6B1B-4DA3-97C4-767BDA8F680C}</CLSID>
- <CLSID>{B25AE380-3C64-43B8-92DF-CD7DD0D31AFC}</CLSID>
- <CLSID>{7239C462-6987-5177-AF61-FF4790041E7B}</CLSID>
- <CLSID>{61D02CEC-F196-F016-A5EC-BFA68EABD7C3}</CLSID>
- <CLSID>{3CA3E8B3-2AEC-D1BC-67A0-CAF0EFBE1257}</CLSID>
- <CLSID>{634992CE-530F-0084-7A94-0195BDD78D93}</CLSID>
- <CLSID>{A3DA8D74-3DBB-6B6A-B7D2-1B6406D94BC8}</CLSID>
- <CLSID>{32D9302D-C715-58E7-D356-16550DDA2E18}</CLSID>
- <CLSID>{723DB09A-5B54-27D8-28D7-5787EFF2B89E}</CLSID>
- <CLSID>{64AAA8B9-3301-64A3-7A77-34B60916AA94}</CLSID>
- <CLSID>{ADD20A4D-68D6-4F45-800A-5CFE51460871}</CLSID>
- <CLSID>{5A31059B-0F8D-D477-A437-E63C01483CA4}</CLSID>
- <CLSID>{05F1335B-D243-36F8-6815-765831B80108}</CLSID>
- <CLSID>{EA111030-D94F-1D5C-556A-FC2C9C7B1225}</CLSID>
- <CLSID>{8614147A-3326-1E0A-307E-1E042C6F4D5F}</CLSID>
- <CLSID>{264EC04E-068F-085A-8A2C-2F27C190BC90}</CLSID>
- <CLSID>{99602D4E-415A-41B7-B0D6-FFA28061CB4E}</CLSID>
- <CLSID>{75ABCEA0-563C-8B9C-F538-83FF7C428B05}</CLSID>
- <CLSID>{B01F41A6-DABC-F76F-4F6D-43DD757CDBEB}</CLSID>
- <CLSID>{565D9CD0-2D1B-B265-3401-B4D542904CEA}</CLSID>
- <CLSID>{335989CB-3D81-4355-BE55-36B697A4B42D}</CLSID>
- <CLSID>{C68083B0-5654-4D39-8C45-C6D55D38A400}</CLSID>
- <CLSID>{3C6C7E8D-FEFE-4871-8C1C-B371FFEA69CD}</CLSID>
- <CLSID>{842CA3F4-39A8-4F80-0000-000005000000}</CLSID>
- <CLSID>{C43DA601-82E0-11D9-AD64-00E069C67A48}</CLSID>
- <CLSID>{ADDF5F06-3DE4-A41D-5C13-3EAAF30B1F46}</CLSID>
- <CLSID>{143EBC15-4991-A934-4980-E36A6603389A}</CLSID>
- <CLSID>{68AB442A-B040-249F-8553-665578807A4D}</CLSID>
- <CLSID>{34DA8BE2-6225-41AC-5135-3936269FFFE6}</CLSID>
- <CLSID>{4A122419-42C7-47AD-B04D-6614C4DBF479}</CLSID>
- <CLSID>{F7624004-C5C6-4AFD-88E8-96B59C55686E}</CLSID>
- <CLSID>{B9EE66CA-433D-7E40-0E41-7DBE07FC4F7A}</CLSID>
- <CLSID>{DA2B0294-405D-4DDB-886D-CE7FB1C64EAC}</CLSID>
- <CLSID>{B3137401-7CBD-11D9-B51D-0011DA434A24}</CLSID>
- <CLSID>{C29C4257-EDF3-828C-A74B-5F7D42A5857E}</CLSID>
- <CLSID>{0711E541-84E9-11D9-8B7B-0040F24BF2DB}</CLSID>
- <CLSID>{98BF8381-818D-11D9-971B-0000659BD7B3}</CLSID>
- <CLSID>{419FB9C1-85B2-11D9-926C-000E9D0DF297}</CLSID>
- <CLSID>{49AE392C-E232-7DB9-D350-635579D1781D}</CLSID>
- <CLSID>{45806737-ACA8-F471-8798-F80A077AA697}</CLSID>
- <CLSID>{0748F3D9-FF80-F399-5BB6-5ABE96DD3789}</CLSID>
- <CLSID>{8E4998A4-EA7B-FD82-97E1-E20AEAECC8EA}</CLSID>
- <CLSID>{17A7025D-0FF4-4B56-A6DA-271B5926B387}</CLSID>
- <CLSID>{766F9B61-B64F-B399-53BC-66C5E6321C5B}</CLSID>
- <CLSID>{A239FBA0-336B-6950-33E5-99BF5E8FC916}</CLSID>
- <CLSID>{6AED511E-C9F0-1172-4A44-AC98A87BCFB1}</CLSID>
- <CLSID>{488C0A78-6289-11C9-27D7-980D41896737}</CLSID>
- <CLSID>{D5F68207-6BCE-4E64-E4D9-156406DF4FEE}</CLSID>
- <CLSID>{BF7C12FD-2B08-49EC-BEBF-03D74FF6CBC1}</CLSID>
- <CLSID>{E52CA22F-C32D-4FE7-BF8E-80ABDAF2FE69}</CLSID>
- <CLSID>{42F5ACC4-78E9-47A3-BC6D-D88777956813}</CLSID>
- <CLSID>{2B450E7F-3D1F-451E-AB30-3C154DF779C0}</CLSID>
- <CLSID>{F1F78D9D-98CA-4CA9-A6FB-EBC630328CF0}</CLSID>
- <CLSID>{2DBBD141-107F-483A-B96E-3E88C8CAEA29}</CLSID>
- <CLSID>{6EF93456-E84F-2ECA-D303-165505F47D4E}</CLSID>
- <CLSID>{4CEAEA22-8990-11D9-902B-E5CD1906C12A}</CLSID>
- <CLSID>{DBE8F2CB-88A8-11D9-8D31-000234D7862A}</CLSID>
- <CLSID>{431CC981-88F7-11D9-93A7-44458ED3802A}</CLSID>
- <CLSID>{81987654-9403-AFD0-0AE8-55FE907D9846}</CLSID>
- <CLSID>{9A735E65-B77E-83B5-E2CE-86A183CD727B}</CLSID>
- <CLSID>{1A013D1B-37FD-F86D-9AB8-07151F1653C2}</CLSID>
- <CLSID>{73498A5C-3FBD-4F61-983B-C13FBC682C2F}</CLSID>
- <CLSID>{F91F5254-5D7D-414A-ABC1-6ED8B94C2522}</CLSID>
- <CLSID>{8195B0AF-FA3E-4F2C-8A59-01AA63D85C21}</CLSID>
- <CLSID>{EFBC97F2-4308-C0B5-9CAA-B092559036A9}</CLSID>
- <CLSID>{BFED1A66-89A0-11D9-96E8-009084075CD8}</CLSID>
- <CLSID>{B3E1E7A0-D1B5-BFDF-66FC-5A56979BBFF1}</CLSID>
- <CLSID>{6940B362-1D9D-A566-09F2-F2DAC9B11F69}</CLSID>
- <CLSID>{2253F7B3-7251-4F24-AC6C-92C7F73342EF}</CLSID>
- <CLSID>{981F2FDD-5264-45A6-8EA4-FBE582D0F12D}</CLSID>
- <CLSID>{DD5245AF-7BAD-4923-B5CA-92069279A4F4}</CLSID>
- <CLSID>{C9B55F8A-6C8E-4BF8-8062-F63A11E1CD24}</CLSID>
- <CLSID>{C52CBAEC-D969-4635-9F50-426CC15CE463}</CLSID>
- <CLSID>{5C213EFE-855C-440C-88AB-EC9EA8976E4D}</CLSID>
- <CLSID>{37DB6B02-BE35-73B8-D171-625505F3736A}</CLSID>
- <CLSID>{85E56198-1317-4AA3-031F-529D9C16FA79}</CLSID>
- <CLSID>{98F27BA1-74AE-11D9-A856-00409B8DCB14}</CLSID>
- <CLSID>{41D5B50A-FC48-4E14-8D21-3AA56441BD21}</CLSID>
- <CLSID>{3928A8CC-E531-42C0-9810-0ED36F59241A}</CLSID>
- <CLSID>{2EB93899-8085-470F-9137-FE65A0033418}</CLSID>
- <CLSID>{27449403-5B8F-40C4-9CAC-0283D71BD6A5}</CLSID>
- <CLSID>{175863E5-AC7C-4A60-9992-B65EC2FA7949}</CLSID>
- <CLSID>{02BB892E-59FC-4236-AEE7-4A87A8A67573}</CLSID>
- <CLSID>{00C15FAB-BA01-4302-9880-9F456C2E192F}</CLSID>
- <CLSID>{069EEF0A-7FC9-054C-CF6E-2AA71D4BC690}</CLSID>
- <CLSID>{59AC6BEF-5B61-2B7A-2C62-D55A9708772D}</CLSID>
- <CLSID>{E9590744-812B-46C3-96EB-33212855927D}</CLSID>
- <CLSID>{220EC580-374F-3A90-2464-711FF00D1E4C}</CLSID>
- <CLSID>{195E1F1A-2542-4FDC-A2AC-A87115792D55}</CLSID>
- <CLSID>{8C0AF2A1-F254-4419-85A9-682E2A3E4865}</CLSID>
- <CLSID>{1D1D6221-8A97-11D9-8CE3-44450778E5ED}</CLSID>
- <CLSID>{FBBB045C-E6E3-BD6D-B88B-969B1EA838E5}</CLSID>
- <CLSID>{79F50FB9-8139-4979-A167-BF8068737FAB}</CLSID>
- <CLSID>{2643D327-8F3B-4CBA-B5EF-DB7F923EB1C2}</CLSID>
- <CLSID>{01BBBB7E-0FBB-0C60-986B-2DA7194ACEC3}</CLSID>
- <CLSID>{7CFAB12A-B8CF-4E70-9EBE-1650A26CA7D2}</CLSID>
- <CLSID>{1B6E56C8-6E34-4841-8C56-09A9B8AC2FE8}</CLSID>
- <CLSID>{B0CAE7AA-E101-AC62-6287-D0563BD86527}</CLSID>
- <CLSID>{3CF95C56-AC24-4F8A-AB34-EDDD00D8327E}</CLSID>
- <CLSID>{3A8D6322-EC12-59B7-8154-67550F877E4B}</CLSID>
- <CLSID>{660FEFD2-4306-0622-B7AB-060F0FC94E20}</CLSID>
- <CLSID>{83E13EBF-10D2-4117-BB36-F8152A4119EE}</CLSID>
- <CLSID>{2F54FA08-E35B-436C-BB07-153B7BBE6C44}</CLSID>
- <CLSID>{1668EDEC-0754-0586-2FE0-0495CCD4899F}</CLSID>
- <CLSID>{E6AC4E23-7870-456A-B30E-37A5D92A9C7E}</CLSID>
- <CLSID>{4C6AB1F0-09BA-4C3A-B50C-8AC502F87FD1}</CLSID>
- <CLSID>{B85054BD-AB2C-4010-B7C6-88DF1B35633E}</CLSID>
- <CLSID>{668A22E6-9297-418F-9F4E-D95AFAB9A889}</CLSID>
- <CLSID>{F0875B2C-FFE1-4117-A0CA-F40036D308C5}</CLSID>
- <CLSID>{E455FC2C-9D3D-4604-8990-DFEE8ADBAC40}</CLSID>
- <CLSID>{5699343D-5DEE-4463-89AE-7520351F443E}</CLSID>
- <CLSID>{FB018033-9F4E-46AA-98AB-7BDAB6828CB4}</CLSID>
- <CLSID>{9E6EC32A-7C19-4409-99E8-FC980BCDAF26}</CLSID>
- <CLSID>{8A4FE39A-BAF0-4145-BF5C-817C52460DA8}</CLSID>
- <CLSID>{4B57B77A-B130-4EB8-8CFB-42B880F6D311}</CLSID>
- <CLSID>{83B841B8-7772-4FDA-8E8B-16AD2F31424D}</CLSID>
- <CLSID>{9ADC5BE1-EE74-49AD-B429-E1F82A50B60D}</CLSID>
- <CLSID>{E4E5CB5D-7066-4C06-89AB-DC14EA10DC43}</CLSID>
- <CLSID>{394D77F0-9288-4446-B4A8-34D3B2BFC1A5}</CLSID>
- <CLSID>{69A24F29-9719-26E3-D054-12550DAF761B}</CLSID>
- <CLSID>{0421E314-7885-423A-A48F-64DC963EACBF}</CLSID>
- <CLSID>{0003160C-D554-4F0C-AB13-3D5B2AA9DF29}</CLSID>
- <CLSID>{824F961E-C514-D0CC-4C64-4BFCDECFF74D}</CLSID>
- <CLSID>{1FFF365C-B165-02C4-800A-625578D52A6D}</CLSID>
- <CLSID>{147910CC-E564-44A8-2EDA-3D0FCD283F61}</CLSID>
- <CLSID>{9E341BFC-A0E5-ADF4-05C5-F84E4309D3C0}</CLSID>
- <CLSID>{866CFC41-7EDA-11D9-B5B7-0010D32BB654}</CLSID>
- <CLSID>{22E43A5D-E5BE-480D-BB37-A083289A0B9B}</CLSID>
- <CLSID>{478C20EA-F80C-4A54-B6F9-03F77029627B}</CLSID>
- <CLSID>{F0B26941-5127-48B0-B6B5-6F97CDD27CF9}</CLSID>
- <CLSID>{4A3A6FD3-7FCC-4D97-AE53-BE9E6B59F9F3}</CLSID>
- <CLSID>{A31BEA24-0970-4DB2-A5AF-0DF6AB338E4D}</CLSID>
- <CLSID>{CB005C89-861B-DFBB-3803-63A6B901C038}</CLSID>
- <CLSID>{7995F079-1917-4A0E-9F65-4026AED49478}</CLSID>
- <CLSID>{20940C67-4611-4DA6-BC12-E8AC647E40F3}</CLSID>
- <CLSID>{A324BFA1-2E56-11D9-86D6-44456D775C15}</CLSID>
- <CLSID>{DAC595C2-8373-11D9-952F-000B2385A1C0}</CLSID>
- <CLSID>{4FAF19C1-7FF9-11D9-BD2C-4445E275978F}</CLSID>
- <CLSID>{8860C6C0-E7FD-4B0B-AD2C-188DF74D177B}</CLSID>
- <CLSID>{9A94E1DC-F946-4A12-9B00-1099C720E3D5}</CLSID>
- <CLSID>{B7100AC1-7EE6-11D9-A9BD-0005B397DF28}</CLSID>
- <CLSID>{888D65AC-3E2F-41B2-ACE4-DF59C4ACDFD3}</CLSID>
- <CLSID>{92904081-7DFF-11D9-B341-0010FC4683BE}</CLSID>
- <CLSID>{73CDA283-D594-4529-9E74-821EC6ACFB18}</CLSID>
- <CLSID>{98F5510E-7F52-11D9-95B5-00606A510EA0}</CLSID>
- <CLSID>{FBD81690-0049-43CC-A0CF-88EDF2B327D1}</CLSID>
- <CLSID>{039B7C13-F237-757B-D633-29FC992B6EB7}</CLSID>
- <CLSID>{127B258A-8F8E-75B6-D538-4A7711988318}</CLSID>
- <CLSID>{12869A5D-0FF9-B9AA-8BD8-9337FB04C5C6}</CLSID>
- <CLSID>{18D84158-EB3F-2FBC-DD76-64557CF6284F}</CLSID>
- <CLSID>{A6CD064A-8D58-DA2B-316A-5BE3A2FBF453}</CLSID>
- <CLSID>{C375DE0D-F4D5-D76E-F451-DC7FECE368E5}</CLSID>
- <CLSID>{3EAC3BA5-7412-4A8A-1395-BE66BF71FF3C}</CLSID>
- <CLSID>{5CE8DB16-81F8-4F3E-81BB-6BBFD48F01CE}</CLSID>
- <CLSID>{332D2D80-7F6A-11D9-8347-00D095AA8CA9}</CLSID>
- <CLSID>{3AF96374-E316-2C9F-D02F-60557CF4296A}</CLSID>
- <CLSID>{1AA2655F-E113-0ECD-D124-60557BD22C39}</CLSID>
- <CLSID>{2CDF312F-CC0A-4C89-B290-79523D6CA350}</CLSID>
- <CLSID>{97636708-84CE-8518-B51D-897A97B90D95}</CLSID>
- <CLSID>{69007FC1-426B-43F0-881A-914F5275A6A3}</CLSID>
- <CLSID>{62D6EE74-0762-4484-A5DA-81D950039E3C}</CLSID>
- <CLSID>{8AEE093E-C4E8-4D6D-A0E5-FFFA7048691A}</CLSID>
- <CLSID>{32E9DE3D-45DA-1B7C-FD59-1A943A98D9C2}</CLSID>
- <CLSID>{D318D87E-9723-4621-AF8C-D0B718B2BB15}</CLSID>
- <CLSID>{CF23C4C3-25B2-4C9A-994F-ECFDB4FCB341}</CLSID>
- <CLSID>{1FEB2691-57CB-4248-98FD-2BF75D80E3A3}</CLSID>
- <CLSID>{4D8A3271-909A-4EC4-939C-53C5D5DD491A}</CLSID>
- <CLSID>{9FAD9355-C258-432E-8195-6DC787B3713F}</CLSID>
- <CLSID>{52280387-2454-4EAA-8DD3-A19214A8A417}</CLSID>
- <CLSID>{16CE442F-D323-6DD7-24B3-A7113B2DD0D7}</CLSID>
- <CLSID>{20BF6E6E-151C-4C10-B446-D38DEDFDFD77}</CLSID>
- <CLSID>{029EA649-3C78-4007-B6E4-EAB653E87B16}</CLSID>
- <CLSID>{B162077F-5B58-4C41-A009-BBE4408D1EFF}</CLSID>
- <CLSID>{F469F2E6-625A-4FD5-9F42-8E9A7E9E9BE5}</CLSID>
- <CLSID>{9A14D2A4-2ED6-4817-A259-8A9A06292837}</CLSID>
- <CLSID>{2AF7008F-9548-474C-8047-7E98430F35E3}</CLSID>
- <CLSID>{3658EC0B-1264-4D67-B7D0-2BD9CE727828}</CLSID>
- <CLSID>{42465E69-7C0C-11D9-B2F7-000282EED717}</CLSID>
- <CLSID>{AB7BE063-09F0-7A0C-8090-76A2AAF567C4}</CLSID>
- <CLSID>{9E033869-0861-444E-8974-DB23D13DB36C}</CLSID>
- <CLSID>{5F7CD761-7E79-11D9-80B1-444506359E1E}</CLSID>
- <CLSID>{E79689C4-D7EB-471F-BC35-8086E7683139}</CLSID>
- <CLSID>{11EF0C25-495F-482E-86B2-1B2AADB69936}</CLSID>
- <CLSID>{C6078C36-A0CC-4345-8459-74CD0997563C}</CLSID>
- <CLSID>{BCEA8CE5-2C72-418D-BDEF-69DFE81C71FB}</CLSID>
- <CLSID>{B06C6179-D7CC-813A-E864-F87AE5C00DE7}</CLSID>
- <CLSID>{43EAC0F6-F5E9-48E3-BBAF-ED6F327ACAA7}</CLSID>
- <CLSID>{6FD495B1-83FE-48A8-8DCB-71F556CACE33}</CLSID>
- <CLSID>{810975B8-C933-46E8-A3C6-0832CE1F31D3}</CLSID>
- <CLSID>{2EAA5D0D-BF9E-40E5-9086-828514DE12F1}</CLSID>
- <CLSID>{0AB58E3F-F8AF-473A-A902-B1A6348B9532}</CLSID>
- <CLSID>{F450B3A7-9634-465B-80D4-73DDD0E91D89}</CLSID>
- <CLSID>{6FAC3D08-9844-5BEC-800B-61550D827368}</CLSID>
- <CLSID>{B462690F-F4CD-851F-E46D-8E7AECC50D9A}</CLSID>
- <CLSID>{27EBAC92-16AD-40B6-FCB6-69873718E764}</CLSID>
- <CLSID>{EED243BA-DDDA-4AA3-BE91-DF611D4F0483}</CLSID>
- <CLSID>{6AC19941-FB45-45A3-960F-5D157DBE80B8}</CLSID>
- <CLSID>{1B834288-F0D3-4D83-A821-EE18CDF12E6B}</CLSID>
- <CLSID>{A22E5FC6-5624-41AC-9C3F-5F02A2CDEDE4}</CLSID>
- <CLSID>{7F2111F0-F0F8-4421-A2AB-CC1012ABB8D3}</CLSID>
- <CLSID>{8500E0C8-DAA0-40C9-9DA4-E4B90CD94D99}</CLSID>
- <CLSID>{063F55CE-7E14-11D9-A7EB-00104E7F3908}</CLSID>
- <CLSID>{418243C8-5F87-48B1-8036-D452950AEFBC}</CLSID>
- <CLSID>{C1A68492-A438-422D-92C1-0BEC45FB8BEB}</CLSID>
- <CLSID>{47D6F899-3E03-33D3-2B02-38B67819F1B2}</CLSID>
- <CLSID>{B0F8ED77-09CA-0317-B32A-2A17226524BB}</CLSID>
- <CLSID>{9D793B22-D65C-4814-B30D-BA8A2E93CDF6}</CLSID>
- <CLSID>{6DC73D7C-E2DB-4DA7-BACE-3B9897F457A3}</CLSID>
- <CLSID>{40879671-0A81-4EB9-8C3D-FF732AF7F972}</CLSID>
- <CLSID>{182BAFE1-A2F1-11D2-AAD8-0002F5FCDDA9}</CLSID>
- <CLSID>{1261EE41-6FFF-43BA-B0B8-EA4772BC3B11}</CLSID>
- <CLSID>{32FB460C-B613-5E96-875E-625504A07C43}</CLSID>
- <CLSID>{54C1BBB1-B2A1-46C5-B873-6C0F684733AD}</CLSID>
- <CLSID>{43BBE4C6-9DC8-4FEA-9833-DE1DE38434C7}</CLSID>
- <CLSID>{F381F3C3-7E4A-11D9-AAF0-00061DF36195}</CLSID>
- <CLSID>{7538B2E5-0928-53DF-2C8A-26879F86BFEE}</CLSID>
- <CLSID>{83ADB839-3EE3-0638-A018-09CB4CB877FF}</CLSID>
- <CLSID>{16AE3650-B010-1DB8-8751-67557BAE294E}</CLSID>
- <CLSID>{BEFC8DC6-B034-0798-C28C-7610F76DAFF8}</CLSID>
- <CLSID>{89380295-C270-B0DD-D89F-B5C4DCF0929A}</CLSID>
- <CLSID>{E56B4F7A-D490-FA1A-E864-8B7AE0C25CC6}</CLSID>
- <CLSID>{05429DE5-9AEC-4A99-3592-2D986ECF6294}</CLSID>
- <CLSID>{13DFFD82-94B1-31CB-5C0B-300B9E37563F}</CLSID>
- <CLSID>{FE20707E-55DD-02AB-49D8-AE6258A0B4A7}</CLSID>
- <CLSID>{21ACF30C-FA9A-4310-BC04-91E36A40F646}</CLSID>
- <CLSID>{3A140E08-C802-67B8-809D-CF1DF9C20041}</CLSID>
- <CLSID>{9B27E389-B149-C2C8-758A-5712FE0B7F18}</CLSID>
- <CLSID>{302BD18C-5709-F540-1484-1D5734FA8BCE}</CLSID>
- <CLSID>{F4991605-C957-0BAE-49B7-A7115B539ABB}</CLSID>
- <CLSID>{7A2D6053-E475-4884-BDC9-802D1DB4D423}</CLSID>
- <CLSID>{F1DEF624-6BE4-133F-B5DC-676405AC1B92}</CLSID>
- <CLSID>{60858031-4631-466C-BDEE-6D13568E9E6C}</CLSID>
- <CLSID>{9992B161-7F71-11D9-9436-000283AD3776}</CLSID>
- <CLSID>{84977702-8CCD-4D87-8086-2FB364B6B670}</CLSID>
- <CLSID>{75982578-18B2-43CC-82AB-CB23091A460A}</CLSID>
- <CLSID>{626A9896-5053-75FA-2BE1-7195BFA3DC91}</CLSID>
- <CLSID>{0B5A7A02-0897-4046-87C2-7A13FF8E4AEE}</CLSID>
- <CLSID>{93B3667E-CBAA-4151-91E7-391006CB7B18}</CLSID>
- <CLSID>{B32DCFA1-7F77-11D9-8710-0005E88A82C4}</CLSID>
- <CLSID>{FEE2A97E-C8C2-A677-8AF0-992DD76300B4}</CLSID>
- <CLSID>{A82E8761-E065-4C4E-A413-3CBD372C79DC}</CLSID>
- <CLSID>{ECAD82D5-5DD7-4988-8EDF-31DE55E185B8}</CLSID>
- <CLSID>{62261700-8D4A-11D9-97AF-000F1CBF36FA}</CLSID>
- <CLSID>{DA89C887-0D74-4299-A5B3-0A17FF180617}</CLSID>
- <CLSID>{D027919D-5E0C-4E0E-94F4-E42267EDA96F}</CLSID>
- <CLSID>{E95072B8-EEA7-4890-B8F8-EC131536B77E}</CLSID>
- <CLSID>{18602A14-7CCB-4ABA-AB4B-CE4A95161D3B}</CLSID>
- <CLSID>{483DBF0F-B0D5-4888-A3FE-1B645E4529A7}</CLSID>
- <CLSID>{A66AB471-FF75-44C7-8775-1438042DCAE4}</CLSID>
- <CLSID>{6DBD1FA1-837A-11D9-9AB9-00D09BFA0B6C}</CLSID>
- <CLSID>{A1B6E34D-9D16-4F38-B17A-2449786B2172}</CLSID>
- <CLSID>{3119D1F9-6F23-47BD-A7D9-AD5AB9D97B67}</CLSID>
- <CLSID>{6F40F53E-9974-4CF9-918D-3C7B562501AB}</CLSID>
- <CLSID>{641A9FE1-772F-0BAE-7E96-0195C9D7DF9E}</CLSID>
- <CLSID>{44775B7B-DF41-4574-BC23-DD68100DEC2D}</CLSID>
- <CLSID>{63A5B957-F6D9-4FD2-86F6-6F4E91AE65C1}</CLSID>
- <CLSID>{A71AC5C2-85B5-4499-B4E2-2B6562E5D86A}</CLSID>
- <CLSID>{5A76C301-7AA7-11D9-A793-00017D710671}</CLSID>
- <CLSID>{8D2C8219-2BC9-3AF1-2367-1C96CE1BD8ED}</CLSID>
- <CLSID>{3E0695FC-844E-4D7B-B9A5-9D3ACC95C428}</CLSID>
- <CLSID>{2A8219AE-1186-4B36-ADEE-A24CD6F984F1}</CLSID>
- <CLSID>{6639AA6E-2DE5-1868-F21A-1C0A80D494F4}</CLSID>
- <CLSID>{3AA83C7C-B246-28BA-8652-65557EAE2F6E}</CLSID>
- <CLSID>{BC295A8D-1054-ADD2-7921-4933BA265D3F}</CLSID>
- <CLSID>{251ED2D7-C18E-4D5B-BA76-E3A09CE9DDF3}</CLSID>
- <CLSID>{792FF262-C0F6-45C2-9BBF-117DC2D69801}</CLSID>
- <CLSID>{87877C70-4245-4013-B7B9-ABD4B4D2CB03}</CLSID>
- <CLSID>{CF021F40-3E14-23A5-CBA2-717765723548}</CLSID>
- <CLSID>{3F41BE24-E9AF-8F6E-1B97-77E4DD08C9B3}</CLSID>
- <CLSID>{3F0A7FD9-F1CC-5543-6FCB-396BC564D1AF}</CLSID>
- <CLSID>{FB440C37-4188-1C42-7EFC-CBF09C88F4A5}</CLSID>
- <CLSID>{7EF3AB76-03FA-4111-8727-703105B105F5}</CLSID>
- <CLSID>{B196617C-E7A7-8F20-C4BE-D3B62B9C17F1}</CLSID>
- <CLSID>{B6C03679-B2A1-DD77-9DBE-D3B62B9C14A3}</CLSID>
- <CLSID>{CDE6C8BD-BD66-F90F-463B-1ACBBD3565C1}</CLSID>
- <CLSID>{2BF055B0-F59D-61CC-FDBF-BBA61731438A}</CLSID>
- <CLSID>{E1F85535-7137-0AB5-A108-C5091CC4C3BA}</CLSID>
- <CLSID>{1FDF0E25-0177-0BD8-DF08-579004080E05}</CLSID>
- <CLSID>{2771A88D-3349-26D4-6913-5E3D6BB8E04F}</CLSID>
- <CLSID>{6EBA17FF-7FD4-DA7B-D801-092767CE6E45}</CLSID>
- <CLSID>{10BE0D06-D3DA-E900-EF0E-ED55058EE6AC}</CLSID>
- <CLSID>{1D6C8D9B-31AD-6A7D-25F1-A40B518CB5D0}</CLSID>
- <CLSID>{5B478E70-38F3-CA56-8C6A-F9DBD8508914}</CLSID>
- <CLSID>{29D85F04-92C0-EE38-6B32-B7DFD60147B3}</CLSID>
- <CLSID>{2A036643-C8D4-43D6-9CA6-BCA1123F2B70}</CLSID>
- <CLSID>{34614418-8F88-4191-A17F-F5A64E315C86}</CLSID>
- <CLSID>{6F0E1901-8CE3-11D9-85D7-0040E871C4CB}</CLSID>
- <CLSID>{D36AC614-F331-F31A-53ED-FDD682644311}</CLSID>
- <CLSID>{BFCEBE8F-92C4-4762-814E-3DCCD9EB8606}</CLSID>
- <CLSID>{4D0E117F-6A6D-47D4-ACEE-397C848A1CEA}</CLSID>
- <CLSID>{27AEC4A9-04D2-010E-E4EE-05EC681D0E43}</CLSID>
- <CLSID>{9987C861-90EA-11D9-AD6F-444526093E27}</CLSID>
- <CLSID>{7DC8D70D-AD83-450A-94C6-02E54F76554B}</CLSID>
- <CLSID>{1C044AAD-7955-4CBD-8175-501A165C4E5D}</CLSID>
- <CLSID>{92F283B9-293E-4231-9BB4-7590BA06B4CC}</CLSID>
- <CLSID>{763C2D0D-CA93-461D-BF79-DCC1786D9B4A}</CLSID>
- <CLSID>{4719DA01-8DD4-11D9-86C8-00086252635B}</CLSID>
- <CLSID>{7A12A061-1396-4A68-8D0D-920618F280DA}</CLSID>
- <CLSID>{D9B01994-E62F-4C66-AEA2-7D910D0A65F3}</CLSID>
- <CLSID>{F19C092B-94D8-5E55-32D6-D05850CEB9A8}</CLSID>
- <CLSID>{424ECF3F-0AA2-ED97-35AB-180E7F0F8EB4}</CLSID>
- <CLSID>{7F8E08A1-9574-11D9-BD6B-000B5CBE5959}</CLSID>
- <CLSID>{916DF902-94E7-11D9-966A-001051BFB1CB}</CLSID>
- <CLSID>{C1FD7ED5-D1A1-42E5-AA40-5B9C73A61AC9}</CLSID>
- <CLSID>{79087965-71F3-E206-3B60-2AF5FFBD19AA}</CLSID>
- <CLSID>{F5055B76-786D-4C1A-8519-427B411B63DB}</CLSID>
- <CLSID>{84D7618E-B6FD-43F3-C5E9-F9934345100C}</CLSID>
- <CLSID>{8D195624-80FF-8F80-C868-02E47C15E2AD}</CLSID>
- <CLSID>{4C580F56-04E1-FC90-E63F-BBA726790B91}</CLSID>
- <CLSID>{E29B4805-5788-4226-9A72-E169C09B46AC}</CLSID>
- <CLSID>{49AB6F51-C016-7292-810B-6D550CFA7245}</CLSID>
- <CLSID>{B70EFFD6-964A-11D9-B116-000254ABE582}</CLSID>
- <CLSID>{13589181-4F0D-4553-B9F8-B4B72172C139}</CLSID>
- <CLSID>{BAF40407-81E1-4981-B8C0-B16642A2D2E7}</CLSID>
- <CLSID>{86C67865-5E4B-89A3-AC2F-5B5A6034A958}</CLSID>
- <CLSID>{3FEBB941-2AFE-468D-888C-04C5A0CB971C}</CLSID>
- <CLSID>{E81B8DBD-CA3F-41CD-A579-2EC9DB81D72A}</CLSID>
- <CLSID>{557DA3F5-62E6-4D05-B0BB-0BCD62C7AFE2}</CLSID>
- <CLSID>{2E8DDD22-B959-4209-9B25-FC23BB7214CB}</CLSID>
- <CLSID>{1AB9A820-C2DB-A88B-A0A6-2FF5B0F4737A}</CLSID>
- <CLSID>{539CD7F6-690E-4C9B-BC33-F7B5B4BDE97B}</CLSID>
- <CLSID>{6FE9218F-F1AF-4595-A5E7-CB0AB7587F79}</CLSID>
- <CLSID>{E0DA0190-95DC-47E1-9A7E-C74E77109C8B}</CLSID>
- <CLSID>{8792BD7C-AC59-4C16-B166-37A6EC3BF1A0}</CLSID>
- <CLSID>{75CFB27C-7FBA-5139-CF6B-2CA71F48C5B5}</CLSID>
- <CLSID>{93F1C865-3803-9149-D3C4-3BB5A30E7516}</CLSID>
- <CLSID>{18B8331E-80E3-49E4-8009-EBCC0933A0E8}</CLSID>
- <CLSID>{5564A298-FBE3-0550-7DC3-C15BBD9771C1}</CLSID>
- <CLSID>{38D4D5D0-423E-4220-B6F9-30918C2AE4A4}</CLSID>
- <CLSID>{A90029FD-70AF-316E-CF3F-17FA3F1C1C14}</CLSID>
- <CLSID>{BF686074-D2EC-FE18-E069-FF7A90B05BE0}</CLSID>
- <CLSID>{57F8F210-085B-4B7D-89FF-DDD007E22C29}</CLSID>
- <CLSID>{C66AD327-16E0-4D4F-C9A1-4E8192B15F9E}</CLSID>
- <CLSID>{37EBBF3A-0DF9-0272-D18F-554032EAFD9B}</CLSID>
- <CLSID>{D0353054-2378-4316-AC2E-C088E8950DCD}</CLSID>
- <CLSID>{80FFB436-CFED-43E4-A693-E0F7B0F5ACDF}</CLSID>
- <CLSID>{D756541A-E5DC-AA20-FE79-C8C9DEC06F96}</CLSID>
- <CLSID>{4888300E-E439-509A-DA50-64550DA9764C}</CLSID>
- <CLSID>{97D9F9BB-0441-0B23-B05F-5D74ED758D56}</CLSID>
- <CLSID>{ABBA4394-DEC6-4542-A008-4D6F74424E87}</CLSID>
- <CLSID>{69F102E1-78FA-11D9-8633-00E0A1DF9605}</CLSID>
- <CLSID>{6B8A4777-B845-51CF-D504-16550DFA7E3A}</CLSID>
- <CLSID>{921CBE5A-2A96-45FE-885B-A97A3794F4AE}</CLSID>
- <CLSID>{06FC1DF0-F2DC-430A-A40F-E8E3A2F4E334}</CLSID>
- <CLSID>{2041AB6C-669B-F327-4633-E37DB709B041}</CLSID>
- <CLSID>{BF727391-D1BA-464F-8314-BCCBA153ED20}</CLSID>
- <CLSID>{2241E83C-45E4-4164-8379-F5C9385B468F}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2319</ID>
- <PROCESSLIST>
- <PROCESS>TASKMGN.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Malware/Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2329</ID>
- <PROCESSLIST>
- <PROCESS>MCAFE32.EXE</PROCESS>
- <PROCESS>MSAMS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WORM_RBOT Parasite/Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2330</ID>
- <PROCESSLIST>
- <PROCESS>IEHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Adware (IEHOST)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System</CONDITION>
- <CONDITION>PRODUCTNAME~IEHost</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2332</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TROJAN.EXE)</PROCESS>
- <PROCESS>(MSSGS.EXE)</PROCESS>
- <PROCESS>(MSN MESSENGER.EXE)</PROCESS>
- <PROCESS>(MSGSWORD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Trojanserver3 Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~trojanserver3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2333</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MPHSZFC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (MPHSZFC.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0e31f3d6573c46a9af35c8be1e79cf5f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2334</ID>
- <PROCESSLIST>
- <PROCESS>IESEARCHTOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EB381422-F797-4A98-A266-9DC490821907}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IESearch Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2335</ID>
- <PROCESSLIST>
- <PROCESS>SYSTEM32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SYSTEM32.EXE Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2336</ID>
- <PROCESSLIST>
- <PROCESS>TBEXTN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6b95678d-30a4-4ff8-a72f-4208340c1f7f}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IEMenuExtension Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2337</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VSHIYSQ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (VSHIYSQ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=94c70008fe9d9be76e7a7b08b9cbd200</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2338</ID>
- <PROCESSLIST>
- <PROCESS>KERNELS32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Troj/Dloader-FC Trojan Downloader</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2339</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LEAU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (LEAU.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8cc9a997a59fd00d30d6f9fa87099ce3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2340</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(5186.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (5186.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4d53b8e8fb60af6297f2af4ac191ad57</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2341</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KFJLIM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (KFJLIM.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=70c5c1ccf72bf38504fc0263fd05b2a5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2342</ID>
- <PROCESSLIST>
- <PROCESS>IESEARCH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>LookNSearch Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2343</ID>
- <PROCESSLIST>
- <PROCESS>PEOPLEONPAGE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Apropos Media/PeopleOnPage.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2344</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OITXAM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (OITXAM.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9426a3f175fc732031baf53f43e90a58</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2345</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MGKEI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (MGKEI.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6a4d4b445f8668804104a15cc14ada7e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2346</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KGOTCXCI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (KGOTCXCI.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=af8a583fd88d0478af573a9e9e46b2dc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2347</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DYVEO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (DYVEO.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9159b83cbdd499978c8274de13a07373</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2348</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ASXQAFGP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (ASXQAFGP.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=69949cfd62165146c6a8f0758204c0a9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2349</ID>
- <PROCESSLIST>
- <PROCESS>DMVLITE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (DMVLITE.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2350</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SECURE.EXE)</PROCESS>
- <PROCESS>(PWGWMJ.EXE)</PROCESS>
- <PROCESS>(PEZUML.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SECURE.EXE Redirector Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>INTERNALNAME~redirect</CONDITION>
- <CONDITION>MD5=5061127004bed33a9defc8f69c6c0665</CONDITION>
- <CONDITION>MD5=1693121F01C137EB3F894085EFCAD375</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2351</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MPCWGTV.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{01FB9C55-FC66-4476-A199-389241193188}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (MPCWGTV.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2352</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IWRQUTLHF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (IWRQUTLHF.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0f58a1f16bbbbf9ba436de2a93e0dc04</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2353</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HAPIU.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{5BCF29E9-E25E-9CA3-2F30-91DC474DBAC0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (HAPIU.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d358bea13e1972e71bbd18928f72ad14</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2354</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IERF32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (IERF32.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=993b8bd271c00a3db4f4e38864df8689</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2355</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(P0DJZCRTJ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (P0DJZCRTJ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=6d31a1d30c28157c30847a1723640351</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2356</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EETU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (EETU.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b1ef615c8f80d5e3b7273395418a784b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2357</ID>
- <PROCESSLIST>
- <PROCESS>MSXMIDI.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant (MSXMIDI.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2358</ID>
- <PROCESSLIST>
- <PROCESS>STRAD32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1433F750-E53F-11D8-9669-0800200C9A66}</CLSID>
- </CLSIDLIST>
- <SUMMARY>STRAd32 Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~STRAd32</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2359</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>APPTQ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2BAB9DCF-AB6E-FD19-25BB-4FA3012F78E1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown URL Search Hook (APPTQ.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2360</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINNTX.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (WINNTX.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=360730a15adfa1e2e17032a6f90bcbd2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2361</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TASKMNSGR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (TASKMNSGR.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8ed6ec9ba888dc8a2a8a53e680634647</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2362</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(POUNBV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (POUNBV.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1931b3696d6f6f59c6b90dfd0820af7f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2363</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EXP1ORER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS EXPLORER.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f14467957bc32374227955c37e679cbf</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2364</ID>
- <PROCESSLIST>
- <PROCESS>SVCH0ST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS SVCHOST.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2371</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BLEH BYTE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=08dd4219e97d95e04e42c6949ed5e4eb</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2372</ID>
- <PROCESSLIST>
- <PROCESS>WST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EC788B03-A743-4274-AC9E-DB4F2A03F515}</CLSID>
- </CLSIDLIST>
- <SUMMARY>WST Module Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2373</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ADDLU.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0C0B3165-AF00-6B5A-D914-42A02B2759AC}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (ADDLU.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2374</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BSHZFHKL5.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (BSHZFHKL5.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=648a0370fa041f6b56f5f0630922b6ec</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2375</ID>
- <PROCESSLIST>
- <PROCESS>MTC.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9EAC0102-5E61-2312-BC2D-4D54434D5443}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Tubby BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2376</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FKAIFD32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (FKAIFD32.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=af3d42cec345fa6e72aa19adcc5b1cb3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2377</ID>
- <PROCESSLIST>
- <PROCESS>SPOOLSRV32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SPOOLSRV32.EXE Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2378</ID>
- <PROCESSLIST>
- <PROCESS>SVPHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVPHOST.EXE Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2379</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(QMFBL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (QMFBL.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7b356b3a63130005ca3cbc1761b9a2b0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2380</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IVJQEQF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (IVJQEQF.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=16459de619aac95c1c5699869158f6fa</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2381</ID>
- <PROCESSLIST>
- <PROCESS>DATEMANAGER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>DateManager</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2383</ID>
- <PROCESSLIST>
- <PROCESS>LSASSS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SASSER.E Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2384</ID>
- <PROCESSLIST>
- <PROCESS>PWRSACEZ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-C8FB-FC6DA787AD2D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>KeenValue Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2385</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VOYPONMG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (VOYPONMG.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9bbb8d733c26477c94b911a749ce4132</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2391</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PCGLAVCG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (PCGLAVCG.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4fef7f94e87a3d4e5ceb49f187f90738</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2392</ID>
- <PROCESSLIST>
- <PROCESS>EVTHTM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EVTHTM.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2393</ID>
- <PROCESSLIST>
- <PROCESS>VIRGINS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>VIRGINS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~dialer</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2410</ID>
- <PROCESSLIST>
- <PROCESS>WINSYNC.EXE</PROCESS>
- <PROCESS>SYNCROAD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Windows SyncroAd Adware Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SyncroAd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2411</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>AMCIS.DLL</PROCESS>
- <PROCESS>AMCIS2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EBBFE27C-BDF0-11D2-BBE5-00609419F467}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Stub Loader Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2412</ID>
- <PROCESSLIST>
- <PROCESS>SEARCHUPGRADER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>KeenValue SearchUpgrader Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2413</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SVCHST.EXE)</PROCESS>
- <PROCESS>(WINAGENT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVCHST.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f0225bf20873226df2bb5be28a22fddf</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2414</ID>
- <PROCESSLIST>
- <PROCESS>SVCHOSTT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WSAConfiguration Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2415</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(STCGA11N.EXE)</PROCESS>
- <PROCESS>(FRE0_32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (STCGA11N.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e37ef3caec59d1a92e8681904883f5f5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2416</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SWP256.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (SWP256.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=facc179603fa874feab477891ee8aabe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2417</ID>
- <PROCESSLIST>
- <PROCESS>SOFT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BeavButt.A Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2418</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FMWEBK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (FMWEBK.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=57b4c8b61e0b8a3eea58f5e5891647a7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2419</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OGRGVLRA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (OGRGVLRA.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f7e34435378cf5a9d74ce12e4636bd4c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2420</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(Q9OOI3.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (Q9OOI3.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ba880ad48e30f55a6e2b0c09202fdbcc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2421</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TMPF00.EXE)</PROCESS>
- <PROCESS>(TMPF01.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Processes (TMPF0X.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4502461faa90764eab16eac74f00c14b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2422</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RUBZI239.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (RUBZI239.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1cdeebe4074b5287c9014726e112af00</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2423</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PYL0XCYHC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (PYL0XCYHC.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e6d9260007a17f864f7ee7a7deaad2ca</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2424</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(QDXJSZ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (QDXJSZ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=42955ca0e651f6e8c4db89fea24d8c74</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2425</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINFBFE32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (WINFBFE32.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=cc62a5caf7dcbcc51647d854de3e6b2c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2426</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WFYWBTZ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (WFYWBTZ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=74a42f94de3088ab95853f8c89378f95</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2427</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(XCUF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (XCUF.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ec6d0ee829ba9e5991cd62cdd03dbb20</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2428</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WYS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (WYS.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=55fa80bda8923ec59e71fd9d8938ba3e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2429</ID>
- <PROCESSLIST>
- <PROCESS>DAILYTOOLBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{8333C319-0669-4893-A418-F56D9249FCA6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>DailyToolbar Adware Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2430</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SBCIE027.DLL</PROCESS>
- <PROCESS>SBCIE026.DLL</PROCESS>
- <PROCESS>SBCIE0261.DLL</PROCESS>
- <PROCESS>SBCIE028.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{08351227-6472-43BD-8A40-D9221FF1C4CE}</CLSID>
- <CLSID>{08361226-6472-43BD-8A40-D9221FF1C4CE}</CLSID>
- <CLSID>{08351226-6472-43BD-8A40-D9221FF1C4CE}</CLSID>
- <CLSID>{08361227-6472-43BD-8A40-D9221FF1C4CE}</CLSID>
- <CLSID>{83B28A74-640D-48F4-9F51-E80EED7CC7E0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SideStep Adware Browser Helper Object / Explorer Bars</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2431</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSOBJS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (MSOBJS.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a5a2d1ed847c56f5aaa9074774486508</CONDITION>
- <CONDITION>MD5=7AF61DAC853546FFA111EF806B3CE541</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2432</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BDIVEL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (BDIVEL.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1e34d43cb9988e1f4a8b48f5cabd2706</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2433</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NKQQ5.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (NKQQ5.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fb7343076d6798b633b86ff634fd7430</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2434</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CDSM3239.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (CDSM3239.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4c1ac635b91753b4879cac796f8cbf64</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2435</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KSSS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (KSSS.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3cc32c14af15863e5c4903d729ff03b1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2436</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MFCBX.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (MFCBX.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c8eccc63300601bc9f69c7160b31dd2c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2437</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(2LESS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3015e91ac7e020e14e57631403c28d70</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2438</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ACID ADMIN FUNK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7ef573ba687a75e74e5b6142a76e0279</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2439</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(STOPBA~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c035efb30a0634720c955658a8499339</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2449</ID>
- <PROCESSLIST>
- <PROCESS>ADV.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9EAC0102-5E61-2312-BC2D-414456544F4E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2475</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IPOE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (IPOE.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=77bca48f901317ed1136be3bb79fe1bd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2476</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IEVK32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (IEVK32.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bd5a9b7860190924b913b82f34ecf3a2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2477</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DBJYED.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (DBJYED.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0b6f63c1b461d6c4d517605dee2f9976</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2478</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EJ9PBMX.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (EJ9PBMX.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3ca779c04c43867696cc993592940fa8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2479</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EQZJG91B.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (EQZJG91B.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0133aa6ccbe32522c7fe056517db5b4b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2480</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(USAI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (USAI.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7e2c6c9f8c59964ee9c50123ce0989c3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2481</ID>
- <PROCESSLIST>
- <PROCESS>NTXP2.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>NT System Module</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2482</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LICENSEMEET.EXE)</PROCESS>
- <PROCESS>(LICENS~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=051d8c2a13246e0d7a855809d78cd8e7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2483</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GREY VIEW.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d585b61f983c2a527cead196dc9527c3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2490</ID>
- <PROCESSLIST>
- <PROCESS>TSMSETUP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (TSMSETUP.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2491</ID>
- <PROCESSLIST>
- <PROCESS>SETHCD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (SETHCD.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2492</ID>
- <PROCESSLIST>
- <PROCESS>SMBDINS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (SMBDINS.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2494</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IGAVQF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (IGAVQF.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9a1f3cf70a56a527669d93cf7cd4b531</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2495</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSZLZ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{A39772BA-6D62-4EB7-B337-5C1A11FAB3B9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (MSZLZ.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e1e976cf148c607d5f05cdbd20f27cb3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2499</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(YWVHGJD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (YWVHGJD.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=bb6b2e25a5506ea2a92ad583a5cf3313</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2500</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(HOFOO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (HOFOO.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=13a3b54efd5f1462f8dc2218578e1dcd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2501</ID>
- <PROCESSLIST>
- <PROCESS>IDONATE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{397D7D63-816E-4ECF-8761-775C932C5CF1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>iDonate Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2502</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TIBS3.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TIBS3.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ae9e17aa72a74c9ea9bdd8677847a7bd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2503</ID>
- <PROCESSLIST>
- <PROCESS>AP9H4QMO.EXE</PROCESS>
- <PROCESS>GAH95ON6.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.ShopAtHomeSelect.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2504</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LCIMGB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{DF8DB041-753D-11D9-8512-000E5213B0D0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown BHO (LCIMGB.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2ed01295218208e657934dfa6d99228f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2506</ID>
- <PROCESSLIST>
- <PROCESS>COMET.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1678F7E1-C422-11D0-AD7D-00400515CAAA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Comet Cursor BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2519</ID>
- <PROCESSLIST>
- <PROCESS>N20050308.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>N20050308.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2559</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ATI2EVXX.EXE)</PROCESS>
- <PROCESS>(TI2EVX~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fcc00fafa1eb4370c9a29e14673bc753</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2560</ID>
- <PROCESSLIST>
- <PROCESS>SPECIALOFFERS.EXE</PROCESS>
- <PROCESS>SPECIALOFFERS4.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Special Offers Networks Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2561</ID>
- <PROCESSLIST>
- <PROCESS>01A00.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00F16DC8-1B2A-42F4-B18B-E21DA9D2D7FD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SubSearch Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2562</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WTTA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (WTTA.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8f083b96e59a7693b4e057391a65e2ed</CONDITION>
- <CONDITION>MD5=B237922D120B96FD23BC5FC702D84927</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2565</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EIRYBSH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (EIRYBSH.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5f086edb45ff3bc9d61ea0d6711c2d51</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2581</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>W8C6S4~1.DLL</PROCESS>
- <PROCESS>DT2NZM~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{467FAEB2-5F5B-4C81-BAE0-2A4752CA7F4E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Parasite Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2588</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BGVVRB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (BGVVRB.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ef25534bc281436daaef578fe3cbbab4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2589</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>INCFIN~2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4FC95EDD-4796-4966-9049-29649C80111D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>IncrediFindBHO Class (INCFIN~2.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2590</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KUJCZX.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (KUJCZX.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=efd846b05a8b54a475f9e5d84b4fa8d7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2591</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VUFABFHC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (VUFABFHC.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=38de7f1ee4957a8b3d18876a9adce338</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2592</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(YVIE6MCVU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (YVIE6MCVU.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9481104fecefd90ad03a545e905cc806</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2593</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NTMSHHS-.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (NTMSHHS-.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=17cc04fdbd2428fd520f27248824c032</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2594</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NEWPOP63.EXE)</PROCESS>
- <PROCESS>(NEWPOP62.EXE)</PROCESS>
- <PROCESS>(NEWPOP61.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>prjMensagem Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~prjMensagem</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2595</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINPO32.EXE)</PROCESS>
- <PROCESS>(MFCGU32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (WINPO32.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=91a23bef807068903988f62a751e54f4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2596</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(APIGB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (APIGB.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0b35b69030ebf46a616dcac84451c0e9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2800</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SVCHOST.EXE)</PROCESS>
- <PROCESS>(CHOST~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=472de7e940f8c894960443e9f6b06e38</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2820</ID>
- <PROCESSLIST>
- <PROCESS>IETB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6596829B-37D4-40AD-971B-1E9041725C52}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Commander Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Microsoft</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2827</ID>
- <PROCESSLIST>
- <PROCESS>IE_CLRSCH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{947E6D5A-4B9F-4CF4-91B3-562CA8D03313}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Clear Search Toolbar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2832</ID>
- <PROCESSLIST>
- <PROCESS>INETDCTR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1C4DA27D-4D52-4465-A089-98E01BB725CA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Var1 Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2838</ID>
- <PROCESSLIST>
- <PROCESS>SBB.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{29F7B7FA-ADC8-48EA-9E1C-EA87A05AE642}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Commander Toolbar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2843</ID>
- <PROCESSLIST>
- <PROCESS>AQADCUP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Backdoor.Agent.bg Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2844</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WINSB1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9FB534E3-67CB-4307-AE0A-9E8B5581BE2C}</CLSID>
- <CLSID>{1E432263-6841-4653-8F02-366A2F77E339}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Windows Search Bar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2845</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SAB3PM.DAT</PROCESS>
- <PROCESS>RVSOFNI.DAT</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{02F96FB7-8AF6-439B-B7BA-2F952F9E4800}</CLSID>
- <CLSID>{D6964FD8-3AF1-4A2A-ABB7-3D0C62924FD6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>VirtuMonde Adware Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2850</ID>
- <PROCESSLIST>
- <PROCESS>BHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{269B6797-664E-48AA-B283-B012BDF6E525}</CLSID>
- </CLSIDLIST>
- <SUMMARY>KeenValue Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2851</ID>
- <PROCESSLIST>
- <PROCESS>NDRV.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1B7D753B-1981-4BD2-91F3-6D055EE113A0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring/PuritySCAN.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2852</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FASTBIRD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9c40dbae7d2fa7a130cb96ce1ce9b5a3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2853</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WZYLFKB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (WZYLFKB.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3e4558bbf7a21401263cef3a7bc0ceac</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2854</ID>
- <PROCESSLIST>
- <PROCESS>SVCHOS1.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVCHOS1.EXE Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2855</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(HKNTFS~1.EXE)</PROCESS>
- <PROCESS>(CHKNTFS.EXE)</PROCESS>
- <PROCESS>(DXPLOR~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4c08de5c4723e8c1137804debe5254d4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2856</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BROWSE SECT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fd877ca137e8ce07625f1760abad4174</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2857</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EXIT FUNK BEEP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b916570f17853ec038973d8cac432869</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2887</ID>
- <PROCESSLIST>
- <PROCESS>BW2.COM</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW2.COM Loader Application (Variant 3)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=CB578468F7F523BC98076E67ECD53C8B</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2911</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BRBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{96DA5BEE-4ACC-476C-B3EC-54C6730C4293}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Comet Cursor Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2942</ID>
- <PROCESSLIST>
- <PROCESS>PDFMGR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{60261C06-81B0-4DE0-9313-E5BA203A64E9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Naupoint Toolbar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2943</ID>
- <PROCESSLIST>
- <PROCESS>SNNPAPI.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{C0EA46D3-7EE4-45E4-9933-1C5B344874C1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Parasite Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2944</ID>
- <PROCESSLIST>
- <PROCESS>WINCT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A21291D3-FB9A-C738-0034-769E8D26575C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unknown URL Search Hook (WINCT.DLL)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2951</ID>
- <PROCESSLIST>
- <PROCESS>ENHUPDT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware Trojan Downloader</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2953</ID>
- <PROCESSLIST>
- <PROCESS>PTASK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Parallel Tasking Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~parallel</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2954</ID>
- <PROCESSLIST>
- <PROCESS>NAVMGRD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BKDR_SDBOT.DP Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2956</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(YLKCDGM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (YLKCDGM.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3700C57866191D828608C80764778D88</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2957</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ULYFLR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (ULYFLR.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=40AE6B18731116AE6FB27FCE865F109F</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2961</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ZAGQW.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (ZAGQW.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1C0696823FF35DDEF38DAE157D48F585</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2963</ID>
- <PROCESSLIST>
- <PROCESS>WINFORMKEEP.EXE</PROCESS>
- <PROCESS>WINFORM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WINFORMKEEP.EXE, WINFORM.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~FormatAd</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2969</ID>
- <PROCESSLIST>
- <PROCESS>1379191.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Haldex Dialer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~HALDEXLTD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>4</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2972</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AATT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (AATT.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=AC3B44B2335BBFCD14B7B24A15882F74</CONDITION>
- <CONDITION>MD5=D0FF9ED933BFAB90033CA5F95CBEA857</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2973</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ASTE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (ASTE.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=35368BFC47F8144CB56F523B3152CA16</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2975</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DENT PLAN FORK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=46C3DBE1955A0996A2497CD4286E1728</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2976</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DRAWACID.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=090D4AE239215C6BA0C2653E298360A4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2977</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DSPT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (DSPT.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=EEDA8F7BF1D9A6878EE1E496890AE05F</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2978</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EETU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (EETU.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=16C56A86E9DA4E814E66F2C674544474</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2979</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EMIA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (EMIA.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=FF9EDCE8DD1F96F4C5F77905E0D0E300</CONDITION>
- <CONDITION>MD5=2CD10A764CBAF071ACF9477627C26D06</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2980</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ITCH PROGRAM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=CA84D5EC034E3418BB07D4F76CF164F9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2981</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(HSTI.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (HSTI.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3E125FC814A162B2A6BFD986E319D3B6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2983</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OSOO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (OSOO.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=E7FC2D6CAA0608507E36BF3D337D88BE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2986</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BDUVKZ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (BDUVKZ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=BA63D606A2CA9C1B5EE2D8C3207DB896</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2988</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ZMGCFCRN.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (ZMGCFCRN.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=27672D34A8BCFB293D85194B726D1CBA</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2989</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NRCFCGMZ.EXE)</PROCESS>
- <PROCESS>(NB4HCGYR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (NRCFCGMZ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=D0CB69ABC8B5788CA137D95B78B11046</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>2993</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>LLDBV.DAT</PROCESS>
- <PROCESS>BACAGV.DAT</PROCESS>
- <PROCESS>SARC.DAT</PROCESS>
- <PROCESS>SARKAB.DAT</PROCESS>
- <PROCESS>3PMTUN.DAT</PROCESS>
- <PROCESS>TNOFYALP.DAT</PROCESS>
- <PROCESS>TACBD.DAT</PROCESS>
- <PROCESS>1INAV.DAT</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3EC8E271-FAB9-418A-8A8E-65AEB4029E64}</CLSID>
- <CLSID>{F32F8ECD-6CF3-459D-82F2-9738392C85A8}</CLSID>
- <CLSID>{6A06CDAD-9D2D-42A0-9C91-C0CF7CB9971B}</CLSID>
- <CLSID>{FF4D5071-EE0E-4DCA-BC1C-D776B0F2276E}</CLSID>
- <CLSID>{D487068E-9B04-4FE5-8A83-08344F800BF5}</CLSID>
- <CLSID>{98BC949B-3D81-4750-836F-4BC57BD032EE}</CLSID>
- <CLSID>{446CF8A5-617E-4D91-95AE-AE78CE0D06AF}</CLSID>
- <CLSID>{0578917D-749F-4B12-ADB2-CF6BFDADB522}</CLSID>
- </CLSIDLIST>
- <SUMMARY>VirtuMonde Adware Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3067</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(XUQKQ.EXE)</PROCESS>
- <PROCESS>(WJDBWSV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (XUQKQ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=C8671C303BF493351963938383B3ED52</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3069</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IWYBSU.EXE)</PROCESS>
- <PROCESS>(IIIDVJ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (IWYBSU.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8B4D2C29BDBE95741036212B6F183488</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3071</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CUQQDN.EXE)</PROCESS>
- <PROCESS>(ARDWEE.EXE)</PROCESS>
- <PROCESS>(SMBIUW.EXE)</PROCESS>
- <PROCESS>(OASIMI.EXE)</PROCESS>
- <PROCESS>(SUSVSP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CUQQDN.EXE Redirector Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>INTERNALNAME~redirect</CONDITION>
- <CONDITION>MD5=69EFD0148C914B38F84A469DB0AB975F</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3072</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SAHAGE~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.ShopAtHomeSelect.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ABE36982590AD87EFBFB8B4FFCAEF103</CONDITION>
- <CONDITION>MD5=1742B045130DA50096D9468F833D15A0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3073</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SPOOLSV.EXE)</PROCESS>
- <PROCESS>(OOLSV~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=450DA1384E4641B24B73D4EC8757FCC0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3082</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(AJNVD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (AJNVD.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>87A53F2B07AC7315C4443F41ABAD88A1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3093</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WOWEXEC.EXE)</PROCESS>
- <PROCESS>(WWEXEC~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ff71169d01d9e328939a8713c89bbf0d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3096</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RTBA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Undefined Process (RTBA.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0c398aa35b715bb42ffb44512635866d</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3097</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>INSTAF~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-90F0-F66AB581A933}</CLSID>
- </CLSIDLIST>
- <SUMMARY>InstaFinderK BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3098</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WOWEXEC.EXE)</PROCESS>
- <PROCESS>(WWEXEC~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ECE7A60B6A1F72A20C583F3687FC5D48</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3150</ID>
- <PROCESSLIST>
- <PROCESS>BARHELP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B1D147E7-873E-4909-8127-695D9BB78728}</CLSID>
- </CLSIDLIST>
- <SUMMARY>DownloadBHO Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~HDT</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3172</ID>
- <PROCESSLIST>
- <PROCESS>DLOAD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Trojan Downloader (DLOAD.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3351</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NSLOOKUP.EXE)</PROCESS>
- <PROCESS>(NLOOKU~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1416FE13DF6A1998D9961424D6C07B8E</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3352</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DVD AXIS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=30288EB0DD7D95CDE30930F05143E7E6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3353</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ATOMSETUP.EXE)</PROCESS>
- <PROCESS>(VVMXKEXO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=991E0F9F1620DB87559E72C89FE82D1B</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3355</ID>
- <PROCESSLIST>
- <PROCESS>SAVE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.WhenU.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME^LEGATO</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3361</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>2020SEARCH2.DLL</PROCESS>
- <PROCESS>2020SE~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-92C6-CE7EB590A94D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>2020Search Toolbar BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3363</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ZJQMLZ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Process (ZJQMLZ.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=09350CE8CDEC02B0AC15D784284E4761</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3365</ID>
- <PROCESSLIST>
- <PROCESS>CSRSSU.EXE</PROCESS>
- <PROCESS>CTFMON32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Browser Hijacking Processes</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3366</ID>
- <PROCESSLIST>
- <PROCESS>WINLOCK.EXE</PROCESS>
- <PROCESS>WINCOMM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Win Comm Downloader Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~COMM</CONDITION>
- <CONDITION>FILELOCATION~WIN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3369</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TIBS5.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f081741557fb25f69ec45d24123a6659</CONDITION>
- <CONDITION>MD5=0ACC07490A2F23321B6E2ED4FB74B9A7</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3370</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=38b55d265720b55a537cf2aac76419bf</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3371</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DDDD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fa09dbe7ccc1dd909b36298ec18dde8e</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3372</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(74825593.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a03183e900524d72cd9487f025ad37ba</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3373</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(F4.TMP.EXE)</PROCESS>
- <PROCESS>(F4.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2B82F987550622CF670AEC50FA26CEC4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3374</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NTEN32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=052a25d8a7e059e135ba2ae1204a0bbc</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3375</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(127062.DLR)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WebsiteViewer Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c8dddd357c3792b8702f278f015bb18c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3376</ID>
- <PROCESSLIST>
- <PROCESS>DESKTOP.EXE</PROCESS>
- <PROCESS>FFISEARCH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.iSearch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~isrvs</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3377</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ELITEGFK32.EXE)</PROCESS>
- <PROCESS>(ELITEAYB32.EXE)</PROCESS>
- <PROCESS>(ELITEFBH32.EXE)</PROCESS>
- <PROCESS>(ELITEJWJ32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Elite Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=BCCA7F61E2095E80521131C763DB3C46</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3391</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(127062.EXE)</PROCESS>
- <PROCESS>(8920768TEMP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WebsiteViewer Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d17db81efd5906eebbbc05278505aa5c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3399</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SIDEBDD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SIDEBDD.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=92b035c1492b2e7e2f605cb111d774e4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3401</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DFE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5030be56075f6c89f7d1b46eb522afa8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3402</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DFSDF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=dfebd24aaf260453b3797bcac3306789</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3403</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EREE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3f253c8b8636f69d08414bfc8b1c82fe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3404</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EWHTT.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=84b3b740ae9aeeb31a844f31e88cb7e4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3405</ID>
- <PROCESSLIST>
- <PROCESS>SOMETHING.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{237AA178-C3BC-4F67-A8BB-D8BC14BA0B89}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Something Home Page Hijacker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3406</ID>
- <PROCESSLIST>
- <PROCESS>MSOPT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B9D90B27-AD4A-413A-88CB-3E6DDC10DC2D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Parasite Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3407</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EJRUTTM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=A28088020C3EEA46B65B39877B8264AA</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3408</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DFSDFHNB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=f894c953c9b6eaafc502e4ad6e5a9795</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3409</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FGSEG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=264a35764908446931fd919a57040af4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3410</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BUILD2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=da5fc22b72ef3ba156f96200d1305fb9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3413</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSMC.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MSMC.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=b877a00ed7eaee6d58ea20478e2c1390</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3414</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(D3NY.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=d3f31459c8e83604ebf018eff4b5d094</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3415</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(127062.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=eac06b67a147aa684e04341455b2dc4b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3416</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=a2a67785a73cce35e57d6cb298264b13</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3433</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(UMJOVCK.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=398FC904A3169E53D58E7F98AE5A33BD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3434</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VVFUCR.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=DFD0ED2831313EC301B2F37D434221F2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3441</ID>
- <PROCESSLIST>
- <PROCESS>SVMHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>W32/Forbot-CH Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3442</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLI32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>W32.Lade Worm / BackDoor IRC Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3443</ID>
- <PROCESSLIST>
- <PROCESS>MSREPAIR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>IRC Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3446</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EETU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=34f75030e669961da9ddff0e0961ed46</CONDITION>
- <CONDITION>MD5=D7BC4DF170A964890BB73D9F678A3CA0</CONDITION>
- <CONDITION>MD5=2CD10A764CBAF071ACF9477627C26D06</CONDITION>
- <CONDITION>MD5=4225C76BD8D74E683166A69B71434673</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3447</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DFE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fcb44a810c803e67e6037241a8626946</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3448</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(D15.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7240503672ee856cac52b6a2db6dc42c</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3449</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IS-PFVRQ.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Inno Setup Temporary Installer Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>APPLICATION</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0d0622f7d2fd629455a028d7e1cb1c07</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>1</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD></TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3450</ID>
- <PROCESSLIST>
- <PROCESS>HLINSTALLER3.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3451</ID>
- <PROCESSLIST>
- <PROCESS>CP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Comedy-Planet Installer/Setup</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5d3ef70df6da15504c8b49f77dbb6dc5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3452</ID>
- <PROCESSLIST>
- <PROCESS>COMEDY-PLANET.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Comedy-Planet</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3453</ID>
- <PROCESSLIST>
- <PROCESS>MEGASEARCHBARSETUP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MegaSearchBar Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3454</ID>
- <PROCESSLIST>
- <PROCESS>INSTAFINDER_INST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>InstaFinder Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3480</ID>
- <PROCESSLIST>
- <PROCESS>SVCSHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Forbot-CF Backdoor Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3496</ID>
- <PROCESSLIST>
- <PROCESS>SENDI.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Gezda/Gaggle Variant Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3497</ID>
- <PROCESSLIST>
- <PROCESS>REGSRV.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Gezda/Gaggle Variant Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3505</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TMPF00.EXE)</PROCESS>
- <PROCESS>(TMPF01.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Processes (TMPF0X.EXE)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2500DC94E71E0591C182DB25F785B367</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3529</ID>
- <PROCESSLIST>
- <PROCESS>ADENH.DLL</PROCESS>
- <PROCESS>A+POPUPBLOCKER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C68AE9C0-0909-4DDC-B661-C1AFB9F5AE53}</CLSID>
- <CLSID>{C68AE9C0-0909-4DDC-B661-C1AFB9F5AE56}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.OnWebMedia.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3535</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BHO010~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000185-C745-43D2-44F1-01A1C789C738}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Smart-Browser Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3537</ID>
- <PROCESSLIST>
- <PROCESS>GBIEH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{E37CB5F0-51F5-4395-A808-5FA49E399F83}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Banco do Brasil Trojan Shell Execute Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Banco</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3540</ID>
- <PROCESSLIST>
- <PROCESS>SVHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>W32.MyDoom.l@mm Virus/Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~System</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3543</ID>
- <PROCESSLIST>
- <PROCESS>MSCD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7BE07C5F-7874-4F88-9142-3277394B4EC5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unnamed Trojan Downloader Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3545</ID>
- <PROCESSLIST>
- <PROCESS>EZSTUB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~StatBlaster</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3546</ID>
- <PROCESSLIST>
- <PROCESS>EZPOPSTUB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~StatBlaster</CONDITION>
- <CONDITION>COMPANYNAME~WebDevWOUS</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3548</ID>
- <PROCESSLIST>
- <PROCESS>ADDNB32.DLL</PROCESS>
- <PROCESS>ADDPX.DLL</PROCESS>
- <PROCESS>HBNH.DLL</PROCESS>
- <PROCESS>YYBHO.DLL</PROCESS>
- <PROCESS>MOEI.DLL</PROCESS>
- <PROCESS>CRRF32.DLL</PROCESS>
- <PROCESS>SYSGH32.DLL</PROCESS>
- <PROCESS>ATLES32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EC0DCF51-1005-877B-C873-10B3F0156A8C}</CLSID>
- <CLSID>{7913BA64-727B-66BD-1BFC-D7C367B7E4D4}</CLSID>
- <CLSID>{004D3581-7796-11D9-9D68-0002F8E66690}</CLSID>
- <CLSID>{ADE50A7A-C3A1-4F2F-860A-89C7AC525213}</CLSID>
- <CLSID>{F9BE3C0B-3ACC-4E08-A83A-4B7E14281DC0}</CLSID>
- <CLSID>{C668EA18-2D58-B7FF-B81A-5DFB1E599256}</CLSID>
- <CLSID>{95BAC7DA-0DDB-6F51-2538-D3418AE96254}</CLSID>
- <CLSID>{9FD1C995-A5B4-6CF5-89E5-27E4347E4EF1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Parasite Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3550</ID>
- <PROCESSLIST>
- <PROCESS>WEBCOMPASS.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A28C2A31-3AB0-4118-922F-F6B3184F5495}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.BonziBuddy/WebCompass.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3556</ID>
- <PROCESSLIST>
- <PROCESS>CNSMIN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B83FC273-3522-4CC6-92EC-75CC86678DA4}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Coolbar Shell Execute Hook by 3721.com</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3575</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MTSBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{094176F9-BF35-4BCB-B68A-108DFB8C3825}</CLSID>
- </CLSIDLIST>
- <SUMMARY>My Total Search Toolbar for Internet Explorer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3578</ID>
- <PROCESSLIST>
- <PROCESS>BHO2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{53E10C2C-43B2-4657-BA29-AAE179E7D35C}</CLSID>
- </CLSIDLIST>
- <SUMMARY>HighTraffic/SubSearch Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3584</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SVCHST.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVCHST.EXE Dialer Variant 1</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=D0EA31F0F303693D57F2C9EB5FB2F875</CONDITION>
- <CONDITION>MD5=AECB580B5FCFC6D99C1FC0C4940F78EC</CONDITION>
- <CONDITION>MD5=89A57848B9E8FE3A1CFCADF61E380BBC</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3585</ID>
- <PROCESSLIST>
- <PROCESS>IESERVICE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9E992732-295F-4987-8BE3-16FAC1639198}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FastFind.org/Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3602</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSHTA.EXE)</PROCESS>
- <PROCESS>(MHTA~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=56B34A38B5730F712DABA7616C7BCE02</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3639</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SPOOLSV.EXE)</PROCESS>
- <PROCESS>(OOLSV~1.EXE)</PROCESS>
- <PROCESS>(LASS~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8E8C71EB6C896031243C648F993D98D6</CONDITION>
- <CONDITION>MD5=24F10531058F81EE69391B4744F6C510</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3642</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HQHT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unamed Spyware/Adware Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=26020705AF02408B18C964743F3163F6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3668</ID>
- <PROCESSLIST>
- <PROCESS>GIGASOFT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{C1EA1782-8E6E-4EA4-9800-B68DE41F1A26}</CLSID>
- </CLSIDLIST>
- <SUMMARY>GagaBar Module Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3669</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MSCONFIG.EXE)</PROCESS>
- <PROCESS>(MCONFI~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=D4F6BA5C0385D11D793BDBE50E5B7A14</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3670</ID>
- <PROCESSLIST>
- <PROCESS>XUDEXOLI.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Sdbot-UW Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3671</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(D3RS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unnamed Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0F7F389EFA630BCBED0DE6B60EF39B58</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3672</ID>
- <PROCESSLIST>
- <PROCESS>NTLH32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{44D535F2-FECD-125A-C19F-C5AAC1173651}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unnamed Browser Hijacker BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3673</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(LOGONUI.EXE)</PROCESS>
- <PROCESS>(LGONUI~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=C4B37910D65D70314577F87F33C574FC</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3674</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NTLH32.DLL</PROCESS>
- <PROCESS>JAVAXN32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{44D535F2-FECD-125A-C19F-C5AAC1173651}</CLSID>
- <CLSID>{80B57DB0-E5CF-E0CC-392C-02C300570864}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unnamed Browser Hijacker BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=EB839B06723872FE100D5F0C11779898</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3675</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EDOW.EXE)</PROCESS>
- <PROCESS>(EDOW_AS2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.WebSearch (WinTools/HuntBar).Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1B26E277F6F278DC8A693685FCF04D4D</CONDITION>
- <CONDITION>MD5=a80c2e1c10a852dfb5371798afb965c8</CONDITION>
- <CONDITION>MD5=1674f2de356fe1ea9dae0d1f1e0cb494</CONDITION>
- <CONDITION>MD5=d7d3b54c8abc5a5d95e4cb29e20cbcd0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3676</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(416984.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=23B7BE6219308B664DA91A74536871F2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3677</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(414531.EXE)</PROCESS>
- <PROCESS>(418625.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=042AEB67FED9EA080CA6840A2D5F5FB3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3678</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WEB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WEB.EXE Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=1772B99ED58A12BF2BFAB036ABDAA07E</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3679</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MFCXB32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3FA36E68CC902946202DE9A7066ADE72</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3680</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RVVQ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=72A2CCA15DD3346DE0FE7B4517BC3E6D</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3681</ID>
- <PROCESSLIST>
- <PROCESS>SYSREN.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Sys Ren Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3682</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IPTIDDHN6.EXE)</PROCESS>
- <PROCESS>(6.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=E6EEB97484E3235F40D5EDFE548E798A</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3683</ID>
- <PROCESSLIST>
- <PROCESS>WINSVC32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Grepage Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3684</ID>
- <PROCESSLIST>
- <PROCESS>SYSCFG32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Sdbot Syscfg32 Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3685</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TRAFFIX1.3.0.2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{88DECE3E-B7BB-4B13-96FE-924AF77C3780}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Traffix Toolbar Client Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3688</ID>
- <PROCESSLIST>
- <PROCESS>BROWSERACCELERATOR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{074E3AA7-7718-4404-B3F8-FF8FB5414E0E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Accelerator BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3689</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WEB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WEB.EXE Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=BAAB46F217CF599ACD537FCB812D0A8C</CONDITION>
- <CONDITION>MD5=CEEF4D40845245DE1558BBC31C7B41DE</CONDITION>
- <CONDITION>MD5=6E72397E82EAC96769476F7A7C09E596</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3690</ID>
- <PROCESSLIST>
- <PROCESS>EZSTUB22.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3737</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=dbf40b5053abeee14277b3c4d086f8a8</CONDITION>
- <CONDITION>MD5=2EC7363CBDB4A8FF62A763691A23B445</CONDITION>
- <CONDITION>MD5=0081E6D576D69ABF3612791DF0208F68</CONDITION>
- <CONDITION>MD5=4E917444C81798C4F758D8C7024F8320</CONDITION>
- <CONDITION>MD5=29A2E9F3B313AAD7D9CB1B701794DD1E</CONDITION>
- <CONDITION>MD5=5B73F44D3E0F4FA5FC4DA8C218142E0D</CONDITION>
- <CONDITION>MD5=813CF0E7B5BE48C61FD5DEFAEF398966</CONDITION>
- <CONDITION>MD5=B76DF76F0C22945214058FF2F729A28E</CONDITION>
- <CONDITION>MD5=329659B72A8A23979A8E05900B451BDF</CONDITION>
- <CONDITION>MD5=6952F134A09626E9BDAEA6FDE0AC121D</CONDITION>
- <CONDITION>MD5=4734E0CFC3C82AB2739EA51D90C08388</CONDITION>
- <CONDITION>MD5=E1E976CF148C607D5F05CDBD20F27CB3</CONDITION>
- <CONDITION>MD5=2ED01295218208E657934DFA6D99228F</CONDITION>
- <CONDITION>MD5=D63211B4B02FFE0295C9B43EA8B936EC</CONDITION>
- <CONDITION>MD5=E7C52CEE1711CC2F7A0C99EFC0BEA938</CONDITION>
- <CONDITION>MD5=3657063316A1A2E2B8F025E67B2CFD42</CONDITION>
- <CONDITION>MD5=26275EED76A50168FB002096F57C2F2F</CONDITION>
- <CONDITION>MD5=22368D3CE9A180821BAE9235C444376D</CONDITION>
- <CONDITION>MD5=4D1F4ACF675413EA75F3DCABBF512E67</CONDITION>
- <CONDITION>MD5=94189BAD6F64DDBFC3EF2EE08D1622EE</CONDITION>
- <CONDITION>MD5=1A553B677041E5D5697FE8DE7CB946E9</CONDITION>
- <CONDITION>MD5=1D425737221CE32C8E7766D8BE6ADC12</CONDITION>
- <CONDITION>MD5=F2DD558AAE9A22E2C677AD74720676F0</CONDITION>
- <CONDITION>MD5=B870E4B1928A7CFA0F5A33E8539F5D29</CONDITION>
- <CONDITION>MD5=B06732E0E58F97E3EE0C3880FA6D7BB5</CONDITION>
- <CONDITION>MD5=6DEE3174C3501A06E49F7C4FE934711A</CONDITION>
- <CONDITION>MD5=6D2349E904E4D0B6E6B6D603DD0BFBF3</CONDITION>
- <CONDITION>MD5=04D80409D33BFB477CAD74D158683041</CONDITION>
- <CONDITION>MD5=B5D89046AE63E8FDD118FE962E659C0F</CONDITION>
- <CONDITION>MD5=6DFE018BDB701ABB40D4CE55476F039F</CONDITION>
- <CONDITION>MD5=8B36ACCF81C71E2AC455D9ABA0460033</CONDITION>
- <CONDITION>MD5=2A52929CBD966B758A72A75267BE87BC</CONDITION>
- <CONDITION>MD5=38E987F92D0257C8086686B42272EC71</CONDITION>
- <CONDITION>MD5=4B1F20A11EB8AD68BBB2382CF9708AC1</CONDITION>
- <CONDITION>MD5=94041A2976E9970777DB0062258D5FE0</CONDITION>
- <CONDITION>MD5=D38553D03186FACF6AFD8724140EB68B</CONDITION>
- <CONDITION>MD5=246A1923B4D6126BF25AD70E096FE702</CONDITION>
- <CONDITION>MD5=5CE9D6829808EC04404C0BD214974A14</CONDITION>
- <CONDITION>MD5=35EF6AB40875A7C32116BD179CD146B7</CONDITION>
- <CONDITION>MD5=064828F96F39A00F685EA5B23890BC6D</CONDITION>
- <CONDITION>MD5=479878A05206C88BB6641EF88986BB3D</CONDITION>
- <CONDITION>MD5=81C85D793629BC184015DDE2FF4DA92E</CONDITION>
- <CONDITION>MD5=5FCD5E8E4BB019AF96B6B4A0EEB54BED</CONDITION>
- <CONDITION>MD5=0081E6D576D69ABF3612791DF0208F68</CONDITION>
- <CONDITION>MD5=E1E976CF148C607D5F05CDBD20F27CB3</CONDITION>
- <CONDITION>MD5=58ED61191AA586B2FAAB59A67633915E</CONDITION>
- <CONDITION>MD5=DEE7C76B4F91CA39A321ECB6AAB9DEEE</CONDITION>
- <CONDITION>MD5=94189BAD6F64DDBFC3EF2EE08D1622EE</CONDITION>
- <CONDITION>MD5=0508762F2DAD2BE2C660DBE73CE87A0F</CONDITION>
- <CONDITION>MD5=B65E68954A084250B3D9552CB1C2D3B4</CONDITION>
- <CONDITION>MD5=A2A67785A73CCE35E57D6CB298264B13</CONDITION>
- <CONDITION>MD5=5EF4C6194E340709D03335FCADEB9CB5</CONDITION>
- <CONDITION>MD5=F7D1C9E35FC6ACAA00EED758543D844A</CONDITION>
- <CONDITION>MD5=73AEAEE77EE9060A4CD39800798F436D</CONDITION>
- <CONDITION>MD5=5E65F1C196245A64A1481E9093019FEE</CONDITION>
- <CONDITION>MD5=0AD9CDD9115CEE4913E04B557621B908</CONDITION>
- <CONDITION>MD5=94189BAD6F64DDBFC3EF2EE08D1622EE</CONDITION>
- <CONDITION>MD5=5DAD67E41B1ABE8AD5C381A4D8B428B3</CONDITION>
- <CONDITION>MD5=E26D01A656E7CC0655D5637FB1E573D5</CONDITION>
- <CONDITION>MD5=95BFF80BFFDCAAFCFA8308F2ABB99640</CONDITION>
- <CONDITION>MD5=11CFD09B8C7940B0543EA0D3A9D099BB</CONDITION>
- <CONDITION>MD5=8D6DF4FF571A43B870DEA97F457E9BE9</CONDITION>
- <CONDITION>MD5=D037BD66C6137EA4F568818141545DA0</CONDITION>
- <CONDITION>MD5=E2825F9027913394B750A89182695186</CONDITION>
- <CONDITION>MD5=44FCFF3220C1A667196106971DB1027A</CONDITION>
- <CONDITION>MD5=F4ED25BC6236F1A382D64BDDA9DE49DE</CONDITION>
- <CONDITION>MD5=DB3D7DDE60D8D8C58CE0DEFFF908E5F0</CONDITION>
- <CONDITION>MD5=A36148C1BA869D8679FE71C97BEE829A</CONDITION>
- <CONDITION>MD5=0DCA232CC09019919C80E50D357E3BF9</CONDITION>
- <CONDITION>MD5=B9F56B70109636BF569691A849437AD2</CONDITION>
- <CONDITION>MD5=D0E9FD2D9FDF0AC40ABA941313288842</CONDITION>
- <CONDITION>MD5=827E527297D11212A8B511E36CD84C4D</CONDITION>
- <CONDITION>MD5=EF361758CCAB7729017E7C567F738A78</CONDITION>
- <CONDITION>MD5=BD94FF99A449590968103ADDFF3ADB7F</CONDITION>
- <CONDITION>MD5=0185600DC2E1B6C473F2EBC595C0FAAA</CONDITION>
- <CONDITION>MD5=994198A02319DEB605221FB010A403A3</CONDITION>
- <CONDITION>MD5=4994B40D469D9908511E4EFB4D20925B</CONDITION>
- <CONDITION>MD5=4D35933DDA87B5F4C48C435CB5EBF387</CONDITION>
- <CONDITION>MD5=189290AEFE47F7570369CA0EB16513FC</CONDITION>
- <CONDITION>MD5=5005FC23532EBEBE6CED670D7E97939B</CONDITION>
- <CONDITION>MD5=9FBBD069F84D4592BF9B347EA45FF83D</CONDITION>
- <CONDITION>MD5=0F5A1098231CA6A463666B67BC047A1A</CONDITION>
- <CONDITION>MD5=FFC8ED7D1890BAB1208AC61A174EB865</CONDITION>
- <CONDITION>MD5=4A8C85FFE73CA771AF310B7D02CF5A35</CONDITION>
- <CONDITION>MD5=9556B40BCFA4B5C194A6A361782CBE29</CONDITION>
- <CONDITION>MD5=A23273FE4AA6530564FE31611B045B69</CONDITION>
- <CONDITION>MD5=4F38F9D921E7CEBDF18FD5DD4E96EE28</CONDITION>
- <CONDITION>MD5=A432F83F41B0E513B8F14B99E579E5FB</CONDITION>
- <CONDITION>MD5=58351FA3B361185744E2A2182FD84243</CONDITION>
- <CONDITION>MD5=58D087D86FA5E910E42C5BF02C3C92E6</CONDITION>
- <CONDITION>MD5=7A598E4B3E5E35490DC624AE3F728590</CONDITION>
- <CONDITION>MD5=F6FFC8ED26312B5F5A19F175E90B687F</CONDITION>
- <CONDITION>MD5=50B67029371F68D938831328CA79442D</CONDITION>
- <CONDITION>MD5=800A84D0EE7074EF052E720410A8109A</CONDITION>
- <CONDITION>MD5=DC9425FE6719D2C3183E333DDA4073A2</CONDITION>
- <CONDITION>MD5=4FE11EEF4EF3D0541E52F271EF59B62C</CONDITION>
- <CONDITION>MD5=03ECBBB6FB5214539333D16D7842A291</CONDITION>
- <CONDITION>MD5=6CF702C5A797E4DE1872ADD9EA08E2F0</CONDITION>
- <CONDITION>MD5=EB7C441F6D9CC39A2EE69FCAAA5FB195</CONDITION>
- <CONDITION>MD5=3881199F8567FEAF7CB4E74EA87923B2</CONDITION>
- <CONDITION>MD5=BAAEDC752D5BD31F98FD7DFD9492320A</CONDITION>
- <CONDITION>MD5=775FC7CAB1ABA85D94BA7DB30C92591A</CONDITION>
- <CONDITION>MD5=15E49C5D58989AB9196E68948EBDABF0</CONDITION>
- <CONDITION>MD5=B1F97FB90B036ACCE55E91462A82104D</CONDITION>
- <CONDITION>MD5=71C8EE3199D70225F7DAEC578DF037BA</CONDITION>
- <CONDITION>MD5=31E64DA22E71871FE04591E6A55DBBAE</CONDITION>
- <CONDITION>MD5=583B7A8CAEFCD6E018755A2CF361320A</CONDITION>
- <CONDITION>MD5=703B40779B43260E81049B194902E6DC</CONDITION>
- <CONDITION>MD5=C5CD7C159949B3677A77241488078784</CONDITION>
- <CONDITION>MD5=4E229D7AE59FA249D8750899BCD770C8</CONDITION>
- <CONDITION>MD5=542DE340F0DBD5EF2A0E5D029D31B8D9</CONDITION>
- <CONDITION>MD5=1DDB7E9020C4DBBE5E56CD177A8CFF58</CONDITION>
- <CONDITION>MD5=DB27DD62C0C628455E211159DEE3C86C</CONDITION>
- <CONDITION>MD5=18549282E4A5F5F32B1E8E460C6E2046</CONDITION>
- <CONDITION>MD5=1B33E338E5FA66E2981AB0CF0F46E783</CONDITION>
- <CONDITION>MD5=DFE66A7805DF680E026ABBB5DFF8CA36</CONDITION>
- <CONDITION>MD5=32AA159EB13968244EF1F62C231331C5</CONDITION>
- <CONDITION>MD5=C537AABAE749AAA0B8147EE4D92003D7</CONDITION>
- <CONDITION>MD5=8E547666145CD4F3E4E68DE1D225AC06</CONDITION>
- <CONDITION>MD5=D853913F7EDA4B65C5D41EBC7A3068C4</CONDITION>
- <CONDITION>MD5=58D1B1C5D0CDBBB13E55316C36D4D4F1</CONDITION>
- <CONDITION>MD5=2C5088B8E4701E45649583F114D61A38</CONDITION>
- <CONDITION>MD5=6E6FA6A2F5667EB47AC253383184216B</CONDITION>
- <CONDITION>MD5=1ACDE77F647FE1C21D98C88E1A0A1C44</CONDITION>
- <CONDITION>MD5=754E271B8F185066C26841D8375AF902</CONDITION>
- <CONDITION>MD5=2914FA074DCAF47F768BCA6F032A9F8E</CONDITION>
- <CONDITION>MD5=E4961D6EBC079555336C9DFB24FC2876</CONDITION>
- <CONDITION>MD5=B5C667B68B91D47A425C57F6EAE8C527</CONDITION>
- <CONDITION>MD5=40BA7ACA3A2F4192CC966AEFC6A7743C</CONDITION>
- <CONDITION>MD5=306E8CC484D1F47F48F36A7559C7DFDF</CONDITION>
- <CONDITION>MD5=DA3AF16D7AD867647EFBBBE2D530E282</CONDITION>
- <CONDITION>MD5=9B07C1E40467216C02271654C250805B</CONDITION>
- <CONDITION>MD5=CEF260334FE3BF2EC6B6E6E5B6EFC17C</CONDITION>
- <CONDITION>MD5=983341E62C17A6B6B9B61A561B63671F</CONDITION>
- <CONDITION>MD5=9D0AF2B4D64753AD522A02736897B0D5</CONDITION>
- <CONDITION>MD5=FCBBFBE5D13F4FFFFD9F36639B413D55</CONDITION>
- <CONDITION>MD5=59E234B5840D729488FE14420A301EDB</CONDITION>
- <CONDITION>MD5=81C04B9B1AD00B955D5B252836BA0980</CONDITION>
- <CONDITION>MD5=1838B7B237444D2C5EE36DF9470B8934</CONDITION>
- <CONDITION>MD5=720925114ED4E8B09D61BD520DA0C6E1</CONDITION>
- <CONDITION>MD5=9DFFA49EFD6D427335931731985B887B</CONDITION>
- <CONDITION>MD5=0FFA201453B5BE9FF61928EAC4280356</CONDITION>
- <CONDITION>MD5=38E6B6F723920B7C755F6B25BA0AE81E</CONDITION>
- <CONDITION>MD5=203349866E31669E85B0CC036DF362D4</CONDITION>
- <CONDITION>MD5=0D40EA21E0CB99BD94A4E16F75073A6E</CONDITION>
- <CONDITION>MD5=5C8737332D7DA522418F8D9C762AF426</CONDITION>
- <CONDITION>MD5=ABF54E6BF48528842EF345FEAD95DE5F</CONDITION>
- <CONDITION>MD5=E95102CA178680EAD50BE7DCCA1F2FED</CONDITION>
- <CONDITION>MD5=C1E6A2E5222375E943760BB3F90BE550</CONDITION>
- <CONDITION>MD5=D39F6984010BA4B57FEA98F747D75E06</CONDITION>
- <CONDITION>MD5=722E45B49658468E4F8FCF5D6C3C1BD2</CONDITION>
- <CONDITION>MD5=A99C817E0E9167786F09A40B0EF9131A</CONDITION>
- <CONDITION>MD5=6705DA92924E907FF84D0C50C752C820</CONDITION>
- <CONDITION>MD5=044326377C749CC0B9CCDB10C4C146F3</CONDITION>
- <CONDITION>MD5=5289D27FAB0957DA2F16FF708E4C523C</CONDITION>
- <CONDITION>MD5=2BB81F2F600C268754B1767B3C3F4CE4</CONDITION>
- <CONDITION>MD5=628355623CFAE0810B850480859837A5</CONDITION>
- <CONDITION>MD5=2A56001BB116214897A610B1266D81E5</CONDITION>
- <CONDITION>MD5=AA0DE09A387F58D1412A5173F9706209</CONDITION>
- <CONDITION>MD5=EDC29423872FDC9357838E91DF82B34D</CONDITION>
- <CONDITION>MD5=CDEE85FB45E360D03D1073A6F52B0163</CONDITION>
- <CONDITION>MD5=8A83F41D7040F6F2C2375901DFED72EF</CONDITION>
- <CONDITION>MD5=9A94CA2E4485A5C36210044DAEE59357</CONDITION>
- <CONDITION>MD5=CC6444372183F14633D3FE6F17679766</CONDITION>
- <CONDITION>MD5=8C154805A7F5FF2E0EE3E6D340F5CC77</CONDITION>
- <CONDITION>MD5=F47FC90C4AC81A488D7E3BC085A345C0</CONDITION>
- <CONDITION>MD5=09E623236E8D6A407F3992E5FA1F08B0</CONDITION>
- <CONDITION>MD5=46DB8C1119A6EE147EF18EC614C5EC54</CONDITION>
- <CONDITION>MD5=9DFC668CE6AFA628DA201A2F88BA20DB</CONDITION>
- <CONDITION>MD5=75ED82C11D7ADB3143097FBE8DCBF511</CONDITION>
- <CONDITION>MD5=93C65E2E0A875C9DC29213F650C166AC</CONDITION>
- <CONDITION>MD5=73F8920DC7A6D5E02B3D3E1B2288AA13</CONDITION>
- <CONDITION>MD5=45D1BAE3CC7FD7F58F5EA1B6AFC7D504</CONDITION>
- <CONDITION>MD5=269F91C1BC22FB577FEFB01181317E43</CONDITION>
- <CONDITION>MD5=61D93674A7DB36900E1C2BB6CEA8A2C7</CONDITION>
- <CONDITION>MD5=44B4F35EE6EDA27718F2908A15EAE8F1</CONDITION>
- <CONDITION>MD5=1AEE1C71837E5875E2B9114288E2EB82</CONDITION>
- <CONDITION>MD5=19342C39C0828B57BF0D12D17453E53A</CONDITION>
- <CONDITION>MD5=E2D198967F284C0F2A4E46C78094E8C1</CONDITION>
- <CONDITION>MD5=1E8A57BB0D520805324A9F7620338EE0</CONDITION>
- <CONDITION>MD5=E5433072A032ED608D56E8CD0D3E44BD</CONDITION>
- <CONDITION>MD5=23705C5CA14FC2A527B9A6B47D55DE0B</CONDITION>
- <CONDITION>MD5=5EFF2BCEED985A56CE7BFFBFB9788192</CONDITION>
- <CONDITION>MD5=883053ADDAF274A808DB0CAC58A09084</CONDITION>
- <CONDITION>MD5=929146FD2FDFD93E739219E9ACBB2563</CONDITION>
- <CONDITION>MD5=BCAF58F04DDEA970E238E373D2927A0D</CONDITION>
- <CONDITION>MD5=CD4FA23B5F9A37A6383DABA0ACFA7422</CONDITION>
- <CONDITION>MD5=9260E595BF7112238B556FD6BD240D6C</CONDITION>
- <CONDITION>MD5=5A13D00B1FBAB540110FA2D5830D0FA3</CONDITION>
- <CONDITION>MD5=9CD717DFAB356D749620DC3CD74E274D</CONDITION>
- <CONDITION>MD5=1A86C084ED3A808DE8CC63850932B2B1</CONDITION>
- <CONDITION>MD5=6B2C644F69B15D57EE7698691B0E21C6</CONDITION>
- <CONDITION>MD5=21018EAFE25659EFC471552BCD625546</CONDITION>
- <CONDITION>MD5=FFCDA7F3BDD5C95136359A9EE7A21F72</CONDITION>
- <CONDITION>MD5=4B09C83737DDB0A6AF349981D227F691</CONDITION>
- <CONDITION>MD5=8FD340CAB4E35C85226EC4258ADDF29E</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3738</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WAST2.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WAST2.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0D485A547B8ED2F6117EAB97E8AE1641</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3741</ID>
- <PROCESSLIST>
- <PROCESS>MSSAMS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Rbot-SV Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3743</ID>
- <PROCESSLIST>
- <PROCESS>NAVPROTECT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Rbot.AIJ and Rbot.AXF Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3744</ID>
- <PROCESSLIST>
- <PROCESS>CP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Comedy-Planet Installer/Setup</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=A3691894102F47051581DCEFD7B53CD3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3745</ID>
- <PROCESSLIST>
- <PROCESS>NAVUPDATERS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Rbot-UN Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3746</ID>
- <PROCESSLIST>
- <PROCESS>WUAUMGR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unnamed Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3752</ID>
- <PROCESSLIST>
- <PROCESS>MADOPEW.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{275636E4-A535-4668-9FF1-86DC0C62D446}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3753</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SMCVS.DAT</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{30279F2D-1A38-4785-97D4-5C3508BDB289}</CLSID>
- </CLSIDLIST>
- <SUMMARY>VirtuMonde Adware Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3754</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SMCVS.DAT</PROCESS>
- <PROCESS>PTFCA.DAT</PROCESS>
- <PROCESS>RBARC.DAT</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{30279F2D-1A38-4785-97D4-5C3508BDB289}</CLSID>
- <CLSID>{2527BEEF-1B3C-4D3B-98F0-7F3C1EB910A0}</CLSID>
- <CLSID>{68132581-10F2-416E-B188-4E648075325A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.VirtuMonde Variant.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3755</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7a3e86ff7c155338c00202a783962ad5</CONDITION>
- <CONDITION>MD5=9ED6CE218CC8598DCBE114B02B911A6D</CONDITION>
- <CONDITION>MD5=7FE84B339E4AF4684946AB405DC7DE9B</CONDITION>
- <CONDITION>MD5=6E6668F1A2D632E416D20CFF410DD6A5</CONDITION>
- <CONDITION>MD5=A2C4CA3E852CF798470294E7CE482B85</CONDITION>
- <CONDITION>MD5=39020b04154d3e26be07afffa42ca6de</CONDITION>
- <CONDITION>MD5=E489B105E13545CDC05173DA5A28222A</CONDITION>
- <CONDITION>MD5=EDA6B14DF3258BF455B21AC0B2669B98</CONDITION>
- <CONDITION>MD5=FE6469153BB1869BB814ECFFF7580547</CONDITION>
- <CONDITION>MD5=65D79AF5076361CFF468A196CBF23C39</CONDITION>
- <CONDITION>MD5=D8127ED00C6A7E65C82436C88448656E</CONDITION>
- <CONDITION>MD5=A268106EDE31873C636B1519D9558AB9</CONDITION>
- <CONDITION>MD5=C784B76D8AA07E3BD190901E2EB20966</CONDITION>
- <CONDITION>MD5=40242C949ABFAF74F3C951C886A8ACAC</CONDITION>
- <CONDITION>MD5=C63AD2174AC9BDA4CEBCB23F4B14FA0A</CONDITION>
- <CONDITION>MD5=14725F4AC7B4EE0D74357F748EE212FD</CONDITION>
- <CONDITION>MD5=F56F5D6EAD336ADA672A41A9941B7528</CONDITION>
- <CONDITION>MD5=2D52AC9D2F154DE51025EEA6340F1FCB</CONDITION>
- <CONDITION>MD5=6D3AD71DF93F23849ABEF0FC040A9318</CONDITION>
- <CONDITION>MD5=0C021E606EB9DA9AEB7A4BA0E5DC0BF9</CONDITION>
- <CONDITION>MD5=96F6CE4E53783A6AF034F14F1A42840C</CONDITION>
- <CONDITION>MD5=91EF5280C40F86D569EC0E3587C71E3D</CONDITION>
- <CONDITION>MD5=8EB34F434B15D306779BAED431534557</CONDITION>
- <CONDITION>MD5=B8F80A5C998AA1C3B8E485F699865E1A</CONDITION>
- <CONDITION>MD5=214AEB657D5C0144F47F453F3B32474A</CONDITION>
- <CONDITION>MD5=B4D1E0EC388C2E3047FB7C5D1960732B</CONDITION>
- <CONDITION>MD5=F0F19D0808633D3AC8071E85CE09D3FB</CONDITION>
- <CONDITION>MD5=6579582971728CD815F53A070893AC35</CONDITION>
- <CONDITION>MD5=09661153678D856AF36FADC92343A154</CONDITION>
- <CONDITION>MD5=4F3FAF0AA1D98F105F8C9FDB39902B7C</CONDITION>
- <CONDITION>MD5=B24095520EFB9D43D620D049391E5C62</CONDITION>
- <CONDITION>MD5=D2CDE5ADE6BC729C9B24BDD9E2C56652</CONDITION>
- <CONDITION>MD5=E0B58F47A1F05EE1424C9E146D63228E</CONDITION>
- <CONDITION>MD5=48EFE69BC7EA6A6A095700D1D9E8DCA6</CONDITION>
- <CONDITION>MD5=E411DE6136BC8467BBC1E42F1B4E7C0A</CONDITION>
- <CONDITION>MD5=55A96F846EAE9D3756C06A9C2FABDBD3</CONDITION>
- <CONDITION>MD5=4F1B55FBC549AE5FFF9EB34811431E3E</CONDITION>
- <CONDITION>MD5=32EA25BDE2A449F03277278E57D954F6</CONDITION>
- <CONDITION>MD5=60D95403DB0A2ED69EF5F2304C4642C2</CONDITION>
- <CONDITION>MD5=44FC97EED87B303238BECC789D84092F</CONDITION>
- <CONDITION>MD5=F75B2C92F8BC47C758DFB9203F1FD0FB</CONDITION>
- <CONDITION>MD5=02F1E21A0A863AF455684324384553BA</CONDITION>
- <CONDITION>MD5=2A03E6C6BC96F75E89165299EBD832DC</CONDITION>
- <CONDITION>MD5=D49DCBA1C8175015464703B00FD691CE</CONDITION>
- <CONDITION>MD5=C280B1CBB18732FDEA7DE408CA5FA015</CONDITION>
- <CONDITION>MD5=D49DCBA1C8175015464703B00FD691CE</CONDITION>
- <CONDITION>MD5=2CAB857D8F4E0A4DE7C9B1976293B7B0</CONDITION>
- <CONDITION>MD5=0C00460598D90969907635564CA4B05C</CONDITION>
- <CONDITION>MD5=38184C110325CAB554F0F140D72D94A3</CONDITION>
- <CONDITION>MD5=1EEBBBBD05B54D46CD1013075379BA24</CONDITION>
- <CONDITION>MD5=53865C8D99DA40FB20EC86DFCB4456C5</CONDITION>
- <CONDITION>MD5=D7943FFD40E04E9FB342EE43934BAB63</CONDITION>
- <CONDITION>MD5=CF0F6193E735628B0138375252936374</CONDITION>
- <CONDITION>MD5=7394988BB68B4E6CA447F378D55D36E2</CONDITION>
- <CONDITION>MD5=32AC065FC1F8BB84A373ED19B34C3AB3</CONDITION>
- <CONDITION>MD5=EDF394BFEE11950765D53AC3F5A8E239</CONDITION>
- <CONDITION>MD5=1383E1BE430DA383FCB9D6A0712EA76F</CONDITION>
- <CONDITION>MD5=F96DC137AAE860EF0D871AB758F7B61A</CONDITION>
- <CONDITION>MD5=D8F0DBA98E4DA966F05772BCCA106700</CONDITION>
- <CONDITION>MD5=89348F89EDDB19EB5822596835D39959</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3771</ID>
- <PROCESSLIST>
- <PROCESS>IEXPLORE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>IExplore Stealth Redirector</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=Redirect.EXE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3780</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TIBS3.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TIBS3.EXE (Variant)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=3331FDABA48994E4EA1CA3BA5827392C</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3823</ID>
- <PROCESSLIST>
- <PROCESS>MOUSECNTL32.EXE</PROCESS>
- <PROCESS>MSMON.EXE</PROCESS>
- <PROCESS>FLPYCNTL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Gema Variant Trojan Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>COMPANYNAME^Microsoft</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3824</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Gema Variant Trojan Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7F1256276482D5954E212BC813F05089</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3825</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DDDD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=33c8a40e289fefdad815daa9da5eac9f</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3826</ID>
- <PROCESSLIST>
- <PROCESS>WINTITLE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F6053709-5723-454E-AB9D-7FC7E681AFA5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>WinTitle Module BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3827</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=251849a6098262bdd3526258177d7161</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3828</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BSUYDHJO.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=707EDFD34755CDFC85B7F3DE29E6F1E8</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3831</ID>
- <PROCESSLIST>
- <PROCESS>WINIS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Rbot-VD Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3833</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FFINST.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8ee6ecc6abae5f4456fba57b7d1d3098</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3834</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(VT00.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=fdae4e35b6a1d0d641e6ece6da109152</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3835</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(I15.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=dab1336a8391a363d0f489c79ac8a019</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3836</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SSK_B5.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0508870ff6cf581d67bc1574c8305bbf</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3837</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RXRTNQ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=CAE5DAC951E13878FF3CA237AADE99FD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3838</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>1O579IM79GDEF.DLL</PROCESS>
- <PROCESS>4ZB501FU8F8L.DLL</PROCESS>
- <PROCESS>GK1G7TVUB4V5.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{0388EC16-BA98-416F-9D9B-B9A031E427AF}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Small-CT Trojan BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3840</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MS486.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Apropos Media/CxtPls.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=262CF7EBD18BDBC6D08A0AFE1339B326</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3842</ID>
- <PROCESSLIST>
- <PROCESS>BW2.COM</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW2.COM Loader Application (Variant 4)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=af2fb77f958b6339cbf3bbce9ccf748a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3843</ID>
- <PROCESSLIST>
- <PROCESS>BW2.COM</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW2.COM Loader Application (Variant 5)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=46f85ada7025373ec6223603e69c1ff1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3844</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(INSTALLER.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>INSTALLER.EXE Loader Application Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ae3fa7a67dfb4fef43a87ad283554453</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3845</ID>
- <PROCESSLIST>
- <PROCESS>BW2.COM</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>BW2.COM Loader Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TEMP</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3852</ID>
- <PROCESSLIST>
- <PROCESS>VBOUNC~1.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Spyware Labs/Virtual Bouncer.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~vbounce</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3853</ID>
- <PROCESSLIST>
- <PROCESS>WINAMP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Gaobot.AFJ Virus Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>COMPANYNAME^Null</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3855</ID>
- <PROCESSLIST>
- <PROCESS>WINAMP6.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>W32.Multex.B Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3856</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(56D28VJ7KZTHD.EXE)</PROCESS>
- <PROCESS>(J3SC725LOJXTHD.EXE)</PROCESS>
- <PROCESS>(UN475LP3K1THD.EXE)</PROCESS>
- <PROCESS>(UXE35ZSBH3THD.EXE)</PROCESS>
- <PROCESS>(FIU2D88956H9THD.EXE)</PROCESS>
- <PROCESS>(XEN9K2CYWCHZTHD.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=60D2C7913E038FDE2A0614BA42DAB87E</CONDITION>
- <CONDITION>MD5=9CB77B9F484305A7DA2E973BC5C9CA3C</CONDITION>
- <CONDITION>MD5=4A9BBC17E3D98A36A0B442327498C126</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3857</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>T1JKXT~1.DLL</PROCESS>
- <PROCESS>W8C6S4~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{467FAEB2-5F5B-4C81-BAE0-2A4752CA7F4E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=60D2C7913E038FDE2A0614BA42DAB87E</CONDITION>
- <CONDITION>MD5=9CB77B9F484305A7DA2E973BC5C9CA3C</CONDITION>
- <CONDITION>MD5=4A9BBC17E3D98A36A0B442327498C126</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3896</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SUPPORTINSTALL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WebRebates Silent Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c3378136b52cd66b353119e5eaa14db0</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3897</ID>
- <PROCESSLIST>
- <PROCESS>INSTAFINDERK_INST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>InstaFinder Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3898</ID>
- <PROCESSLIST>
- <PROCESS>BREG.EXE</PROCESS>
- <PROCESS>BPTRE.EXE</PROCESS>
- <PROCESS>BPTRE_INST.EXE</PROCESS>
- <PROCESS>XCPY1_INST.EXE</PROCESS>
- <PROCESS>BPT_C.EXE</PROCESS>
- <PROCESS>BPC_INST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.BroadcastPC.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3899</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NTBB.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=17BF2F9F63408A6FD3757A1AB8F311D9</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3900</ID>
- <PROCESSLIST>
- <PROCESS>WEBREBATES_AUTO_INSTALLSILENT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WebRebates Silent Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3901</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(UVHV8UX4.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=268698C309466546AA060DF1F3A3785B</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3902</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WINCHGK32.EXE)</PROCESS>
- <PROCESS>(WINIDHK32.EXE)</PROCESS>
- <PROCESS>(WINDCIK32.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=A4A3F64A3BABEBE3CE95DD432C4DACFD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3903</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WGYOMZBMQ.EXE)</PROCESS>
- <PROCESS>(OQWTKC.EXE)</PROCESS>
- <PROCESS>(VPZRVMJHE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=96280ED5540A47B14522B549A0F26EB2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3904</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SM.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=36F27012FA5AE156176ADDD1AD76424B</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3907</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(313328.EXE)</PROCESS>
- <PROCESS>(225968.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7802C4AA3428B56A41A55191C3155C69</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3908</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(M80MGU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=BF19E8CB0617E9554D93E38393624667</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3909</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(TZZDWEZE.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=B502F83A7C9B237018A9E24485AF2B79</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3911</ID>
- <PROCESSLIST>
- <PROCESS>EXPLOER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS EXPLORER.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3913</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(BQUCGRRJU.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=21E5D955A7DFD76182BB7E2238C9A38E</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3914</ID>
- <PROCESSLIST>
- <PROCESS>MSMSGSVC.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Start Page Browser Hijacker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME^Microsoft</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3915</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SFITA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=D2D41D8CAE7A8FA08531BCE29244FE7D</CONDITION>
- <CONDITION>MD5=9989fefaa0f64030e02ac5f50536e971</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3916</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(IJJRP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=FE91E3E582CBBE0D709FBB44A13555C1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3918</ID>
- <PROCESSLIST>
- <PROCESS>EMESX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{000000DA-0786-4633-87C6-1AA7A4429EF1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FavoriteMan Downloader BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3919</ID>
- <PROCESSLIST>
- <PROCESS>WO.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WO.EXE (EARN)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Bundle</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3920</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(62656.EXE)</PROCESS>
- <PROCESS>(50468.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=52C94254A03A85B5810F79003CF3DFCA</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3921</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GX9FZJ83M9.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=e573a07eae1d8af7512a4a2e5f4e2b79</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3922</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GPKWUUEW.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=c9dec9330ffc26e3811a7089a9f8dc5a</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3965</ID>
- <PROCESSLIST>
- <PROCESS>EXPLORER32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>EXPLORER32.EXE Worm</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3966</ID>
- <PROCESSLIST>
- <PROCESS>ADTOOLSKEEP.EXE</PROCESS>
- <PROCESS>ADTOOLS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adtools Service Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~ADTOOLS</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3967</ID>
- <PROCESSLIST>
- <PROCESS>WZHELPER.DLL</PROCESS>
- <PROCESS>WEBALIZE.DLL</PROCESS>
- <PROCESS>BARBHO.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-C0FB-EF60B19DA02A}</CLSID>
- <CLSID>{4E7BD74F-2B8D-469E-D7E4-F660B597BF2A}</CLSID>
- <CLSID>{CD2A865B-6C0F-44F9-BAA1-7CDB31E04BC8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SearchCentrix Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3968</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WH5_1833003.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{1BDD55B8-3985-4E59-B906-5E0AD56D6710}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3969</ID>
- <PROCESSLIST>
- <PROCESS>MYGEEK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{C431BF1E-9E71-4BB6-9C4E-8496D158DB1F}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SearchCentrix Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3970</ID>
- <PROCESSLIST>
- <PROCESS>MSHELPER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FF1BF4C7-4E08-4A28-A43F-9D60A9F7A880}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3971</ID>
- <PROCESSLIST>
- <PROCESS>TVM.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>TV Media Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~TV</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3976</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(MKXVMIX.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=5DD3673B1F0CAF87900FAA63E17296F5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3978</ID>
- <PROCESSLIST>
- <PROCESS>PC32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>MSNSysRestore Malware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3982</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(EYTVPJ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9B84980AF3CF2C678B5E2B9EF477B126</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3983</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KUAQYU.EXE)</PROCESS>
- <PROCESS>(XNVGWEY.EXE)</PROCESS>
- <PROCESS>(UQLMBTEA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=E9752207B7807DFEA9BFF1D9EEFE0A76</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3986</ID>
- <PROCESSLIST>
- <PROCESS>SEARCH~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{76532682-A5C9-11D8-AE07-00D0591AB78A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>SpecificMEDIA Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3991</ID>
- <PROCESSLIST>
- <PROCESS>GOGOFILESHARE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SpecificMEDIA GoGoTools FileShare</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>3993</ID>
- <PROCESSLIST>
- <PROCESS>DSLGEACCESS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Click Yes To Enter Ltd. Dialer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>DIALER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4003</ID>
- <PROCESSLIST>
- <PROCESS>WO.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WO.EXE (SEEDCORN) ADWARE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~SeedCorn</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4007</ID>
- <PROCESSLIST>
- <PROCESS>WINDLLSYS32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Win32.Mitglieder Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4011</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>MSAXS.DLL</PROCESS>
- <PROCESS>MSPUA.DLL</PROCESS>
- <PROCESS>MSMIY.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{770C971E-08B7-497E-8F67-801EBA1ECC4D}</CLSID>
- <CLSID>{EB77D262-F353-4AA9-B2BB-889660B0F5EA}</CLSID>
- <CLSID>{0D095E08-3F89-4922-93C1-9AB21B5E37C0}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=B38118DF4A04FD5BF3200BDDEF869682</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4012</ID>
- <PROCESSLIST>
- <PROCESS>MEGATLBR.DLL</PROCESS>
- <PROCESS>MEGAHOST.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7FDCEDCF-77C8-46AE-B0E8-D40C6D1E5158}</CLSID>
- <CLSID>{8BC6346B-FFB0-4435-ACE3-FACA6CD77816}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Mega Search Browser Hijacker</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4019</ID>
- <PROCESSLIST>
- <PROCESS>EZW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>eZstub Module Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~ClickSpringWO</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4028</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KBRPXAXP.DLL</PROCESS>
- <PROCESS>JEWRDTIA.DLL</PROCESS>
- <PROCESS>GZJHECZZ.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{00000000-0000-0000-0000-000000000000}</CLSID>
- <CLSID>{233043EA-60CC-2BBE-60FF-08991175B7EE}</CLSID>
- <CLSID>{CCE00551-E611-0BBC-6707-80AD2AF5A508}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified Threat Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=81B63B9D54B303EDEAF9765A6915EE13</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4029</ID>
- <PROCESSLIST>
- <PROCESS>WO.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>WO.EXE (StatBlaster) ADWARE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~StatBlaster</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4035</ID>
- <PROCESSLIST>
- <PROCESS>JAVAFIX3.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A708A39C-8DA7-4E36-B3B0-0A1FFAFD4B6D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Trojan.KillAV.E Downloader</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4038</ID>
- <PROCESSLIST>
- <PROCESS>EZSTUB.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>PRODUCTNAME~eZstub</CONDITION>
- <CONDITION>FILEDESCRIPTION~eZstub</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4041</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>KABH7.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{EFF80427-F837-4B74-8834-BAF18E0553FD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Undefined Parasite</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4061</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TRAFFIX1.1.0.25.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{3F68A524-6E47-44E6-9FE7-795EABFA3B36}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Traffix Client Application/iMatchUp Adware</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~Traffix</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4078</ID>
- <PROCESSLIST>
- <PROCESS>REGISTRATION.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GogoWare Registration Application</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~SpecificMEDIA</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4086</ID>
- <PROCESSLIST>
- <PROCESS>SCVHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Scvhost Worm (Variant)</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>VIRUS</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=E2A12E3E6831248AD01A1C096CB1F970</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4092</ID>
- <PROCESSLIST>
- <PROCESS>AVIFIL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4100</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ZRIH.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=E2BF5A11873DA031BA76DD874AF0AF42</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4101</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(XYBIRVA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=A5ECCA22AE81E3210247AD8C417C5310</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4102</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GQNMTL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=952EFE24CD5220178BE045E859F70B6C</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4103</ID>
- <PROCESSLIST>
- <PROCESS>PREVADSERV.EXE</PROCESS>
- <PROCESS>PREVADKEEP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Preview AdService Components</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4106</ID>
- <PROCESSLIST>
- <PROCESS>FLT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{665ACD90-4541-4836-9FE4-062386BB8F05}</CLSID>
- </CLSIDLIST>
- <SUMMARY>FlashTrack Adware Browser Helper Object</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4107</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(D3DRM310.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>iehost34 Browser Hijacker Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~iehost34</CONDITION>
- <CONDITION>COMPANYNAME~CSL</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4108</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DW5YYCG7.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=801AAB6765F026A4FF2E554FE8EEC166</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4109</ID>
- <PROCESSLIST>
- <PROCESS>IEDRIVER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>IEDriver (Cydoor) Stealth Redirector</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME=Redirect.EXE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4114</ID>
- <PROCESSLIST>
- <PROCESS>GOGODISPLAY.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SpecificMEDIA GoGoTools AdDisplayWind</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4115</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(PSIF.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=B244E8EA013A309C58F75BE0CF195284</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4118</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WRKPRK.EXE)</PROCESS>
- <PROCESS>(TGTGVG.EXE)</PROCESS>
- <PROCESS>(RARASA.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=C9DAD2A212E699B88CC3F2897A3F08BF</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4120</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CMUTIL.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=81A1FB4172E302007CD3F2AC12D7ABA5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4121</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NWPXGSV.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7A6A56642E7FEC6A68B6B6173EBDE4CE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4122</ID>
- <PROCESSLIST>
- <PROCESS>LSVCHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Webus.D Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4123</ID>
- <PROCESSLIST>
- <PROCESS>WINXP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bagle/Beagle Internet Worm Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4124</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>BPBOH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{40AC4D2D-491D-11D4-AAF2-0008C75DCD2B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>WurldMedia Adware BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>9</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4125</ID>
- <PROCESSLIST>
- <PROCESS>APPLJ32.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{B32D2588-F2B7-0679-4EC0-427E7F172FD3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4126</ID>
- <PROCESSLIST>
- <PROCESS>WINSHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bagle/Beagle Internet Trojan Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4127</ID>
- <PROCESSLIST>
- <PROCESS>HOSTREN.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PWS.Banker.f Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~WIN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4128</ID>
- <PROCESSLIST>
- <PROCESS>WINDIRECT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bagle/Beagle Internet Trojan Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4129</ID>
- <PROCESSLIST>
- <PROCESS>WINHLP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Generic.PWS.f Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~WIN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4131</ID>
- <PROCESSLIST>
- <PROCESS>CSRSS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>PWS-GetMail Trojan</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=977C631432842E4C5F28C4B0D23677CA</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4132</ID>
- <PROCESSLIST>
- <PROCESS>DORIOT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bagle/Beagle Internet Worm Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4133</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(B9.TMP.EXE)</PROCESS>
- <PROCESS>(B9.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=DE8BC3E7A738BCE9A785264D3A883F76</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4135</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(SST.DLL)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{FFFFDA2C-A0D5-4D60-8EE1-1B7F8929E24D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Lycos/SideSearch.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4136</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WIN9E.TMP)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unknown Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=86f0bdb25c5b8572573347c753dd1603</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4137</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(ML00!.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=0b11b036bb5a746387b4d29da87cc29b</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4138</ID>
- <PROCESSLIST>
- <PROCESS>MSACMX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A5366673-E8CA-11D3-9CD9-0090271D075B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>CoolWebSearch Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4149</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SYS85459.EXE</PROCESS>
- <PROCESS>SYS33267.EXE</PROCESS>
- <PROCESS>SYS24347.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Loader32/Sysdown Variant Threat</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=B2C00E3FA92CECA5060839A58F675CC3</CONDITION>
- <CONDITION>FILELOCATION~SYSDOWN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4150</ID>
- <PROCESSLIST>
- <PROCESS>LSSAS6.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS LSASS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4151</ID>
- <PROCESSLIST>
- <PROCESS>MPDAT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Rbot-WG Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4152</ID>
- <PROCESSLIST>
- <PROCESS>SVAPACHE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>SVAPACHE.EXE Worm Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4153</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(CDQVWOQ.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=37EEF1FD59D94043B1587785201F6C70</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4154</ID>
- <PROCESSLIST>
- <PROCESS>CSRSSP.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Bogus MS CSRSS.EXE</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4157</ID>
- <PROCESSLIST>
- <PROCESS>STLINKS2.DLL</PROCESS>
- <PROCESS>STIEBAR2.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{B54BFA47-D897-49CA-9657-05EC9F80A32B}</CLSID>
- <CLSID>{D797AD6C-6447-4DB4-91D0-090344408E72}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Quickmetasearch.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4158</ID>
- <PROCESSLIST>
- <PROCESS>SYSLIBIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{F195A1A9-4033-4E5B-B85C-848C3E31A83A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Syslibie.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4160</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CTPP7.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4B021269-DD24-48B2-96B4-DA121E9C0502}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Parasite.CTTP.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4166</ID>
- <PROCESSLIST>
- <PROCESS>PSCANW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring/PuritySCAN.Installer</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4167</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WUPS.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring/PuritySCAN.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~sear1</CONDITION>
- <CONDITION>PRODUCTNAME~sear1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4169</ID>
- <PROCESSLIST>
- <PROCESS>PURITYSCANUNINSTALL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring/PuritySCAN.Uninstaller</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4171</ID>
- <PROCESSLIST>
- <PROCESS>ZIPPY.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{49256FE8-6394-4ACE-939C-22F35CA042AD}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ZippyLookup.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4173</ID>
- <PROCESSLIST>
- <PROCESS>WEBCOMPASSBAR.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{71B8AB7E-CB3F-4471-878E-8E1DFDF49B8B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.BonziBuddy/WebCompass.Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4174</ID>
- <PROCESSLIST>
- <PROCESS>SBHOSTIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{74CC49F7-EB32-4A08-B204-948962A6E3DB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar/SpamBlockerUtility.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4176</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WCYG.DLL</PROCESS>
- <PROCESS>QRQ.DLL</PROCESS>
- <PROCESS>DCNJA.DLL</PROCESS>
- <PROCESS>UWAGTD.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{0C65C3EE-2922-09AF-2CF4-25879EF7E8CB}</CLSID>
- <CLSID>{FC6016D0-A94A-DDC1-10A2-F53A95474392}</CLSID>
- <CLSID>{05F5BF54-51C1-2249-C108-0A15071EB6CB}</CLSID>
- <CLSID>{24B56A04-809E-F645-9748-DE7841BA9F9E}</CLSID>
- <CLSID>{A9453A6D-D3DC-8527-AF0E-FD5AC77241E1}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=8F6CAA278C718DEA27ACF73EC0852B45</CONDITION>
- <CONDITION>MD5=E647CF6E82F71D71B76044FD89F31925</CONDITION>
- <CONDITION>MD5=627CBEB5ECD550F9FD447956C131E808</CONDITION>
- <CONDITION>MD5=AE6E833DFE90EAB4E4AA00C73CCE2B58</CONDITION>
- <CONDITION>MD5=C95469C94E1BA723AFBE3704AFCC718F</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4180</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(FUWWWAL.EXE)</PROCESS>
- <PROCESS>(KKVYBM.EXE)</PROCESS>
- <PROCESS>(CRTD.EXE)</PROCESS>
- <PROCESS>(NETUI32.EXE)</PROCESS>
- <PROCESS>(AAQW.EXE)</PROCESS>
- <PROCESS>(SDKGC32.EXE)</PROCESS>
- <PROCESS>(9URA.EXE)</PROCESS>
- <PROCESS>(MMFNCV9K.EXE)</PROCESS>
- <PROCESS>(93KWIF.EXE)</PROCESS>
- <PROCESS>(XLWLODVM.EXE)</PROCESS>
- <PROCESS>(PJLUESNM.EXE)</PROCESS>
- <PROCESS>(OWUJSLR.EXE)</PROCESS>
- <PROCESS>(YLCHBBF.EXE)</PROCESS>
- <PROCESS>(VAXBDNGH.EXE)</PROCESS>
- <PROCESS>(DGRLNZ.EXE)</PROCESS>
- <PROCESS>(2NU0BQF6.EXE)</PROCESS>
- <PROCESS>(BGYHE.EXE)</PROCESS>
- <PROCESS>(FJLFYMT.EXE)</PROCESS>
- <PROCESS>(JPMSK.EXE)</PROCESS>
- <PROCESS>(SONX.EXE)</PROCESS>
- <PROCESS>(XWMGTMW.EXE)</PROCESS>
- <PROCESS>(GGIP.EXE)</PROCESS>
- <PROCESS>(NPPWL.EXE)</PROCESS>
- <PROCESS>(GS0H6CWF.EXE)</PROCESS>
- <PROCESS>(GS0H6CWF1.EXE)</PROCESS>
- <PROCESS>(YTQZATYKZINB.EXE)</PROCESS>
- <PROCESS>(MZRZM.EXE)</PROCESS>
- <PROCESS>(OYRCKBIU.EXE)</PROCESS>
- <PROCESS>(RGFXXDE.EXE)</PROCESS>
- <PROCESS>(LWIRJUC.EXE)</PROCESS>
- <PROCESS>(ZIWZM.EXE)</PROCESS>
- <PROCESS>(ZIWZL.EXE)</PROCESS>
- <PROCESS>(NTBGR1.EXE)</PROCESS>
- <PROCESS>(NEWRT.EXE)</PROCESS>
- <PROCESS>(AEIAR.EXE)</PROCESS>
- <PROCESS>(RRWKWO.EXE)</PROCESS>
- <PROCESS>(YFWC.EXE)</PROCESS>
- <PROCESS>(GMGLI.EXE)</PROCESS>
- <PROCESS>(GCBT9.EXE)</PROCESS>
- <PROCESS>(YSVUW.EXE)</PROCESS>
- <PROCESS>(WUFGZTU.EXE)</PROCESS>
- <PROCESS>(LSWXC.EXE)</PROCESS>
- <PROCESS>(YLHPY.EXE)</PROCESS>
- <PROCESS>(THRUL.EXE)</PROCESS>
- <PROCESS>(SNWLITSU.EXE)</PROCESS>
- <PROCESS>(RFBJ.EXE)</PROCESS>
- <PROCESS>(OOQF.EXE)</PROCESS>
- <PROCESS>(MOEU.EXE)</PROCESS>
- <PROCESS>(LXYKI.EXE)</PROCESS>
- <PROCESS>(LNKL.EXE)</PROCESS>
- <PROCESS>(KWITBXVA.EXE)</PROCESS>
- <PROCESS>(JBTYB.EXE)</PROCESS>
- <PROCESS>(EFNH.EXE)</PROCESS>
- <PROCESS>(YHJEHNQX.EXE)</PROCESS>
- <PROCESS>(SDKJO32.EXE)</PROCESS>
- <PROCESS>(JAVAAS32.EXE)</PROCESS>
- <PROCESS>(ATLUK32.EXE)</PROCESS>
- <PROCESS>(ATLHZ.EXE)</PROCESS>
- <PROCESS>(IPOK.EXE)</PROCESS>
- <PROCESS>(IEXY.EXE)</PROCESS>
- <PROCESS>(X1002142005.EXE)</PROCESS>
- <PROCESS>(Z0E46JR4.EXE)</PROCESS>
- <PROCESS>(WJAJW.EXE)</PROCESS>
- <PROCESS>(FWMTW4MO.EXE)</PROCESS>
- <PROCESS>(OOC.EXE)</PROCESS>
- <PROCESS>(TII.EXE)</PROCESS>
- <PROCESS>(125777.EXE)</PROCESS>
- <PROCESS>(MTE1NDM6ODOXMG.EXE)</PROCESS>
- <PROCESS>(XCCU7APIK.EXE)</PROCESS>
- <PROCESS>(T1UL.EXE)</PROCESS>
- <PROCESS>(R47Y.EXE)</PROCESS>
- <PROCESS>(PCRHOJY.EXE)</PROCESS>
- <PROCESS>(NTRAWS.EXE)</PROCESS>
- <PROCESS>(BQDXUED.EXE)</PROCESS>
- <PROCESS>(ADDJRBVY2.EXE)</PROCESS>
- <PROCESS>(MTE1MZC6ODOXMG.EXE)</PROCESS>
- <PROCESS>(2.EXE)</PROCESS>
- <PROCESS>(J.EXE)</PROCESS>
- <PROCESS>(GCOCZZU.EXE)</PROCESS>
- <PROCESS>(WUCXT.EXE)</PROCESS>
- <PROCESS>(ESAT.EXE)</PROCESS>
- <PROCESS>(MOIQRPBY.EXE)</PROCESS>
- <PROCESS>(NJFPU.EXE)</PROCESS>
- <PROCESS>(SSRZJV.EXE)</PROCESS>
- <PROCESS>(DMHP.EXE)</PROCESS>
- <PROCESS>(RRUP.EXE)</PROCESS>
- <PROCESS>(K5.EXE)</PROCESS>
- <PROCESS>(VZZJY.EXE)</PROCESS>
- <PROCESS>(APP160.TMP)</PROCESS>
- <PROCESS>(PBQAVK.EXE)</PROCESS>
- <PROCESS>(CV0N6U.EXE)</PROCESS>
- <PROCESS>(GTLTHT.EXE)</PROCESS>
- <PROCESS>(DBRLC1.EXE)</PROCESS>
- <PROCESS>(QI7IF2.EXE)</PROCESS>
- <PROCESS>(VOVPOU.EXE)</PROCESS>
- <PROCESS>(WNVDK.EXE)</PROCESS>
- <PROCESS>(GWWAN.EXE)</PROCESS>
- <PROCESS>(BU3CGTV.EXE)</PROCESS>
- <PROCESS>(HHNLZXL.EXE)</PROCESS>
- <PROCESS>(IBHJPDUN.EXE)</PROCESS>
- <PROCESS>(VGGJDJ.EXE)</PROCESS>
- <PROCESS>(3B74F42F.EXE)</PROCESS>
- <PROCESS>(PALDBB.EXE)</PROCESS>
- <PROCESS>(IHEE.EXE)</PROCESS>
- <PROCESS>(2.EXE)</PROCESS>
- <PROCESS>(LKEQAMY.EXE)</PROCESS>
- <PROCESS>(HBQG.EXE)</PROCESS>
- <PROCESS>(SRAR.EXE)</PROCESS>
- <PROCESS>(QTBT.EXE)</PROCESS>
- <PROCESS>(ZVERVF.EXE)</PROCESS>
- <PROCESS>(WINPRXE32.EXE)</PROCESS>
- <PROCESS>(QXKSVUOGF.EXE)</PROCESS>
- <PROCESS>(LJJOOW.EXE)</PROCESS>
- <PROCESS>(IIJYXZWS.EXE)</PROCESS>
- <PROCESS>(RPYGPIJV.EXE)</PROCESS>
- <PROCESS>(NYILVC.EXE)</PROCESS>
- <PROCESS>(RURQA.EXE)</PROCESS>
- <PROCESS>(SF.EXE)</PROCESS>
- <PROCESS>(KWROA.EXE)</PROCESS>
- <PROCESS>(YSHR.EXE)</PROCESS>
- <PROCESS>(YBDCIBXA.EXE)</PROCESS>
- <PROCESS>(MXOLRY.EXE)</PROCESS>
- <PROCESS>(JVJQKW.EXE)</PROCESS>
- <PROCESS>(AEHFBJVR.EXE)</PROCESS>
- <PROCESS>(YSSCNV.EXE)</PROCESS>
- <PROCESS>(XJUTJJ.EXE)</PROCESS>
- <PROCESS>(XCVUNPK.EXE)</PROCESS>
- <PROCESS>(VWNAFYIU.EXE)</PROCESS>
- <PROCESS>(TXFA.EXE)</PROCESS>
- <PROCESS>(POACJ.EXE)</PROCESS>
- <PROCESS>(NYIDP.EXE)</PROCESS>
- <PROCESS>(MSONPPLS.EXE)</PROCESS>
- <PROCESS>(KRWCIV.EXE)</PROCESS>
- <PROCESS>(KMFRM.EXE)</PROCESS>
- <PROCESS>(ITEDIB.EXE)</PROCESS>
- <PROCESS>(HOTXR.EXE)</PROCESS>
- <PROCESS>(HHPSJANK.EXE)</PROCESS>
- <PROCESS>(FTAPFOOV.EXE)</PROCESS>
- <PROCESS>(DNIU.EXE)</PROCESS>
- <PROCESS>(DLNGR.EXE)</PROCESS>
- <PROCESS>(DAJS.EXE)</PROCESS>
- <PROCESS>(BEUHOU.EXE)</PROCESS>
- <PROCESS>(BCLGA.EXE)</PROCESS>
- <PROCESS>(ATOVR.EXE)</PROCESS>
- <PROCESS>(AMMFJIY.EXE)</PROCESS>
- <PROCESS>(CUOAC.EXE)</PROCESS>
- <PROCESS>(GJMCIVR.EXE)</PROCESS>
- <PROCESS>(RKSLFSD.EXE)</PROCESS>
- <PROCESS>(2AK641B6.EXE)</PROCESS>
- <PROCESS>(1DWPCG.EXE)</PROCESS>
- <PROCESS>(1PA8ZXU.EXE)</PROCESS>
- <PROCESS>(4UDFSP.EXE)</PROCESS>
- <PROCESS>(5ZBQSL.EXE)</PROCESS>
- <PROCESS>(ATZRVRW.EXE)</PROCESS>
- <PROCESS>(XATUX.EXE)</PROCESS>
- <PROCESS>(OEUE.EXE)</PROCESS>
- <PROCESS>(PUBDLG48.EXE)</PROCESS>
- <PROCESS>(IEUI32.EXE)</PROCESS>
- <PROCESS>(WUYTC.EXE)</PROCESS>
- <PROCESS>(CVQARVOJK.EXE)</PROCESS>
- <PROCESS>(SQXGDZ.EXE)</PROCESS>
- <PROCESS>(239454.EXE)</PROCESS>
- <PROCESS>(EWIARY.EXE)</PROCESS>
- <PROCESS>(MTE1NTA6ODOXMG.EXE)</PROCESS>
- <PROCESS>(AUAAPX.EXE)</PROCESS>
- <PROCESS>(ASPI.EXE)</PROCESS>
- <PROCESS>(CHLP.EXE)</PROCESS>
- <PROCESS>(PKSDTLGK.EXE)</PROCESS>
- <PROCESS>(COLBACT1.EXE)</PROCESS>
- <PROCESS>(CNBJMON0.EXE)</PROCESS>
- <PROCESS>(CCFGNT75.EXE)</PROCESS>
- <PROCESS>(ZPPK.EXE)</PROCESS>
- <PROCESS>(OOCNVOS.EXE)</PROCESS>
- <PROCESS>(MTE1NJE6ODOXMG.EXE)</PROCESS>
- <PROCESS>(FFUQIRPPAK.EXE)</PROCESS>
- <PROCESS>(IMISYSI6.EXE)</PROCESS>
- <PROCESS>(PMOC.EXE)</PROCESS>
- <PROCESS>(PJMGG.EXE)</PROCESS>
- <PROCESS>(TBONRGEZJ.EXE)</PROCESS>
- <PROCESS>(XAAV.EXE)</PROCESS>
- <PROCESS>(FUKRMU.EXE)</PROCESS>
- <PROCESS>(WCPIDCTL.EXE)</PROCESS>
- <PROCESS>(WIFCKBOX.EXE)</PROCESS>
- <PROCESS>(XSHNQSPC.EXE)</PROCESS>
- <PROCESS>(RULRDCQ.EXE)</PROCESS>
- <PROCESS>(ILOI.EXE)</PROCESS>
- <PROCESS>(AEIT.EXE)</PROCESS>
- <PROCESS>(EBGINP32.EXE)</PROCESS>
- <PROCESS>(D3SL.EXE)</PROCESS>
- <PROCESS>(APIWE32.EXE)</PROCESS>
- <PROCESS>(MSLTUS40.EXE)</PROCESS>
- <PROCESS>(JAVAMK.EXE)</PROCESS>
- <PROCESS>(APPPH.EXE)</PROCESS>
- <PROCESS>(NTJD.EXE)</PROCESS>
- <PROCESS>(UECPCXBMVF.EXE)</PROCESS>
- <PROCESS>(ULGCOXVTB.EXE)</PROCESS>
- <PROCESS>(FTQYWCQI.EXE)</PROCESS>
- <PROCESS>(TDXREGWR.EXE)</PROCESS>
- <PROCESS>(SDXREGOS.EXE)</PROCESS>
- <PROCESS>(HARJTEY.EXE)</PROCESS>
- <PROCESS>(XTZRIVW.EXE)</PROCESS>
- <PROCESS>(ADPTIF.EXE)</PROCESS>
- <PROCESS>(ADPTIF44.EXE)</PROCESS>
- <PROCESS>(OREN.EXE)</PROCESS>
- <PROCESS>(RIRR.EXE)</PROCESS>
- <PROCESS>(OIDDNAHA.EXE)</PROCESS>
- <PROCESS>(LGFX.EXE)</PROCESS>
- <PROCESS>(ODKSBM.EXE)</PROCESS>
- <PROCESS>(GB3.EXE)</PROCESS>
- <PROCESS>(QRKU.EXE)</PROCESS>
- <PROCESS>(ZYIITFA.EXE)</PROCESS>
- <PROCESS>(BJLBZZ.EXE)</PROCESS>
- <PROCESS>(RPEN.EXE)</PROCESS>
- <PROCESS>(60665.EXE)</PROCESS>
- <PROCESS>(1943.EXE)</PROCESS>
- <PROCESS>(93810.EXE)</PROCESS>
- <PROCESS>(89861.EXE)</PROCESS>
- <PROCESS>(GTMD.EXE)</PROCESS>
- <PROCESS>(91232.EXE)</PROCESS>
- <PROCESS>(HH091.EXE)</PROCESS>
- <PROCESS>(OWAFTJ.EXE)</PROCESS>
- <PROCESS>(HHQ.EXE)</PROCESS>
- <PROCESS>(DHKXGDOE.EXE)</PROCESS>
- <PROCESS>(YIKYLOHI.EXE)</PROCESS>
- <PROCESS>(WYCIR.EXE)</PROCESS>
- <PROCESS>(ICQUZ.EXE)</PROCESS>
- <PROCESS>(BLIERXM.EXE)</PROCESS>
- <PROCESS>(BPVAG.EXE)</PROCESS>
- <PROCESS>(ABVAPI32.EXE)</PROCESS>
- <PROCESS>(LRGXYOA.EXE)</PROCESS>
- <PROCESS>(JALCKZ.EXE)</PROCESS>
- <PROCESS>(WINQJ32.EXE)</PROCESS>
- <PROCESS>(CUJYVQGKH.EXE)</PROCESS>
- <PROCESS>(CUHSICJCL.EXE)</PROCESS>
- <PROCESS>(SDJODJXTH.EXE)</PROCESS>
- <PROCESS>(QVPLEGLJ.EXE)</PROCESS>
- <PROCESS>(AVQYSDKJ.EXE)</PROCESS>
- <PROCESS>(WCQJQRT.EXE)</PROCESS>
- <PROCESS>(CQKJPVDWR.EXE)</PROCESS>
- <PROCESS>(GQJC.EXE)</PROCESS>
- <PROCESS>(FJCEEG.EXE)</PROCESS>
- <PROCESS>(JCM32.EXE)</PROCESS>
- <PROCESS>(KFOJ.EXE)</PROCESS>
- <PROCESS>(HUJCEVT.EXE)</PROCESS>
- <PROCESS>(ZTXB.EXE)</PROCESS>
- <PROCESS>(CHJQZE.EXE)</PROCESS>
- <PROCESS>(BZBEJUZH.EXE)</PROCESS>
- <PROCESS>(JGMTPVE.EXE)</PROCESS>
- <PROCESS>(FSFHPUYJJ.EXE)</PROCESS>
- <PROCESS>(IJ5YKIBS1.EXE)</PROCESS>
- <PROCESS>(ZRCE.EXE)</PROCESS>
- <PROCESS>(MSPU32.EXE)</PROCESS>
- <PROCESS>(RPCD2X40.EXE)</PROCESS>
- <PROCESS>(WIRVL.EXE)</PROCESS>
- <PROCESS>(UKELYP.EXE)</PROCESS>
- <PROCESS>(RCBDYCTL.EXE)</PROCESS>
- <PROCESS>(IBEL.EXE)</PROCESS>
- <PROCESS>(CKBMKQGU.EXE)</PROCESS>
- <PROCESS>(KJYLZG.EXE)</PROCESS>
- <PROCESS>(ADTB.EXE)</PROCESS>
- <PROCESS>(SYSTEMREG166B.EXE)</PROCESS>
- <PROCESS>(SSZG.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=CFDC2F43AB01645051EBAA1F16B3BCC9</CONDITION>
- <CONDITION>MD5=AB81E56AC786C5C1FBB9F19EE8A2FE1D</CONDITION>
- <CONDITION>MD5=69627AE0B3F5E7D97DD40BDFE718A4DC</CONDITION>
- <CONDITION>MD5=7B64C9A2C886120B1590B6257F5BA496</CONDITION>
- <CONDITION>MD5=DDD6EDAB4978F4BA998C0B527E55F6F3</CONDITION>
- <CONDITION>MD5=80F05984C0D4184B25BDF2D76EE41787</CONDITION>
- <CONDITION>MD5=C9460A705E5C76A22795E6AB8A1476F9</CONDITION>
- <CONDITION>MD5=7F90139B7DD3A26615945BBC04A71CD5</CONDITION>
- <CONDITION>MD5=9AF67F300FF44A7350624F8445D16750</CONDITION>
- <CONDITION>MD5=ACDBFF3AAAD1A208E91C34E35852C705</CONDITION>
- <CONDITION>MD5=9A5FDC9383C878187ECDB328359C62FB</CONDITION>
- <CONDITION>MD5=89FA37CAA647C6E4789AC1EBD04562CB</CONDITION>
- <CONDITION>MD5=DFCFCA40D6F707C2D25CD1BC7B6E2438</CONDITION>
- <CONDITION>MD5=ED6047074152EC34D803853FA07F1B04</CONDITION>
- <CONDITION>MD5=7AC91EF946906C6004FD642E3A6FBF51</CONDITION>
- <CONDITION>MD5=3DCC07CA772921CB7035A500BC5D044B</CONDITION>
- <CONDITION>MD5=DBF74C5D16B2BFDB770F8F4971BC09B8</CONDITION>
- <CONDITION>MD5=9F807E2ADF8C95094E7F460B97CA0EE0</CONDITION>
- <CONDITION>MD5=51E643BADB171492B718222CA5ED0DE3</CONDITION>
- <CONDITION>MD5=C0D4DF3E8871F75A33F777EFF162BC46</CONDITION>
- <CONDITION>MD5=D1645A1168CCC53643E4C50EA2A3152E</CONDITION>
- <CONDITION>MD5=159296D23D4CD49785F7902114EE9ADA</CONDITION>
- <CONDITION>MD5=8C9040687C7EB237AA458D94DC8784CF</CONDITION>
- <CONDITION>MD5=931803421FB5D37F3C37D6C2F6E94A3C</CONDITION>
- <CONDITION>MD5=9B1CE860C9F486FA344622A70641746F</CONDITION>
- <CONDITION>MD5=AD77D78F34CD4A4357AD2E848560105D</CONDITION>
- <CONDITION>MD5=367F3948B096B05D5BA82B60765D6FA6</CONDITION>
- <CONDITION>MD5=7618220C69C124A709AA1D55643B4871</CONDITION>
- <CONDITION>MD5=99598CC79886A584B43714E34024B5C8</CONDITION>
- <CONDITION>MD5=C4D2A21D5F94E3E5683115FEFBC34092</CONDITION>
- <CONDITION>MD5=8EFCD7C46F56E1A35082544D67B8F871</CONDITION>
- <CONDITION>MD5=064BC66B38554B1612CE0F5D7D2D0595</CONDITION>
- <CONDITION>MD5=051AF2E6289DBEB218B01AE06101E2DE</CONDITION>
- <CONDITION>MD5=411DD7FA3DD1AAC4141ACF9A83F50791</CONDITION>
- <CONDITION>MD5=142715D077C1B42A3F5F8EA299EB3676</CONDITION>
- <CONDITION>MD5=2FE8A3034EF4FF396F7DF062134EF0AA</CONDITION>
- <CONDITION>MD5=b0b22ea1251b917717de309cf2c9727c</CONDITION>
- <CONDITION>MD5=13E932C0349C16253321CCB043078874</CONDITION>
- <CONDITION>MD5=0BD22E4DE16B60F56E0CB39272C278B8</CONDITION>
- <CONDITION>MD5=32C0F66649B2A4116902CF01DCDE7A75</CONDITION>
- <CONDITION>MD5=90DBB70124B80F90974BFAC38D711E53</CONDITION>
- <CONDITION>MD5=07B4650663E4812B1576081697F4D7CE</CONDITION>
- <CONDITION>MD5=C2008F6E8F736CB9529C50ACF935D9B0</CONDITION>
- <CONDITION>MD5=E3931EE8BE6F07E4771F03B12F3AA5E8</CONDITION>
- <CONDITION>MD5=276BC788A673FE0E67D17CC8597A773D</CONDITION>
- <CONDITION>MD5=1173C58A35EE374B96BCC21BD7421B44</CONDITION>
- <CONDITION>MD5=EC7E1906AA8336CFD4AD1231161A5A76</CONDITION>
- <CONDITION>MD5=adc0dc6787044fd904ae6ef6d577e066</CONDITION>
- <CONDITION>MD5=077A4455946A2E9EC5134682D3B7757C</CONDITION>
- <CONDITION>MD5=E88CAFD97F9896D0BA108058DE07CF58</CONDITION>
- <CONDITION>MD5=6512F86A2E667DDDB736244193D00FE0</CONDITION>
- <CONDITION>MD5=250585B8778EB2FB352115B14A27E78D</CONDITION>
- <CONDITION>MD5=9BAF9654D8BCF3AF430D7377DAA17A8F</CONDITION>
- <CONDITION>MD5=835073449B6E14C99E56ACAE31EC5D59</CONDITION>
- <CONDITION>MD5=5AE938E6A3F8140555FCDC99530D031E</CONDITION>
- <CONDITION>MD5=EFB84941D763258FC6E7AC64A47E933A</CONDITION>
- <CONDITION>MD5=8F01FE63D262C2D01E8211500BF63FD4</CONDITION>
- <CONDITION>MD5=34E1677D011DD7504FD9D06E3840168F</CONDITION>
- <CONDITION>MD5=8C8004A14E774B2F62BFB31A0D6AEFE7</CONDITION>
- <CONDITION>MD5=3BD841BA5149BC954ADAF5DDED40818A</CONDITION>
- <CONDITION>MD5=2D810D431B173617D2EC63660340E152</CONDITION>
- <CONDITION>MD5=5C33106FC5563CA1B52EC7E6C3AFFD36</CONDITION>
- <CONDITION>MD5=EDE83B0BF565CB85A0F4664E3DF523DE</CONDITION>
- <CONDITION>MD5=62840BD3E3D46DA2F7E356769210955A</CONDITION>
- <CONDITION>MD5=0041316B39FDC8F772E8CE6B7FF524E5</CONDITION>
- <CONDITION>MD5=08E003E4E62BF031E61AD9C68E35C17F</CONDITION>
- <CONDITION>MD5=32209F502C8D67464E7414FC1C53CAA4</CONDITION>
- <CONDITION>MD5=4CA2C18160B4BFA7FDED689EB2F8110B</CONDITION>
- <CONDITION>MD5=98FFF824104385D1A4C3D0EA5B08FE37</CONDITION>
- <CONDITION>MD5=847A84E9E735B37B2E74F789CC80E410</CONDITION>
- <CONDITION>MD5=69A35A2192F2D0BC709D829436BA816B</CONDITION>
- <CONDITION>MD5=0A1BEEAE3A321D28ACCEB8E787F39768</CONDITION>
- <CONDITION>MD5=84BB9D731A4D6B1983E1A3DD4A881AF4</CONDITION>
- <CONDITION>MD5=18F82246F7316EF8897E679BD542309C</CONDITION>
- <CONDITION>MD5=4D80FEAF5C2969758863C923E95D1965</CONDITION>
- <CONDITION>MD5=817D5B5180136A3E190B3806FDAE0D8B</CONDITION>
- <CONDITION>MD5=1AE224BB96F55D6A686A465DB4FEA8A7</CONDITION>
- <CONDITION>MD5=53783421EAE04D7E0580F975DF387697</CONDITION>
- <CONDITION>MD5=B4E43C826D061441D61D2B3917A34B4C</CONDITION>
- <CONDITION>MD5=EC50DED661471C5F1E00F05D8B6C8D36</CONDITION>
- <CONDITION>MD5=D3FFDB1B42B0FC4C046312DE739AEC00</CONDITION>
- <CONDITION>MD5=1A036B9C2FD123A447DD5F4EEF05900B</CONDITION>
- <CONDITION>MD5=06FFF74E7B6403F0607305625E89A458</CONDITION>
- <CONDITION>MD5=DF20E20BCF57A4E4BA4F0C73C73FDE6B</CONDITION>
- <CONDITION>MD5=9E7C4B6731EB07DF293303150AC139AB</CONDITION>
- <CONDITION>MD5=F2A80383AC1F2506FA81B3992BC1C61F</CONDITION>
- <CONDITION>MD5=3876212D7DEC354BF78D6F426BDF94E5</CONDITION>
- <CONDITION>MD5=5A43AEEBB0EDE2090B4EEDE30A221853</CONDITION>
- <CONDITION>MD5=A56086713CC5CDF90B6B0746A1BC9C57</CONDITION>
- <CONDITION>MD5=F47CDD71F583450AE2530C7CB047B334</CONDITION>
- <CONDITION>MD5=2ED38C5340797A621220EB6B9FEDE621</CONDITION>
- <CONDITION>MD5=701D897AF53ED0ECBEAE2BC57CB9C8C7</CONDITION>
- <CONDITION>MD5=1288E3AC72DDD9DC69D2DC75E69265DC</CONDITION>
- <CONDITION>MD5=266A19056A30C946957D456E021F3230</CONDITION>
- <CONDITION>MD5=1226FD29F35DF547D413DE0D2AC2BBDB</CONDITION>
- <CONDITION>MD5=70E2D9852E2CED01C8B626E9C70777D3</CONDITION>
- <CONDITION>MD5=210125A92F387799A9DE79B0801B70D5</CONDITION>
- <CONDITION>MD5=C4D2A235923ADDABE46BBF99ED8A5DA2</CONDITION>
- <CONDITION>MD5=B972BCE44A84A999CCD4A086AC3A5EE0</CONDITION>
- <CONDITION>MD5=58c674b371512f2ac73d1fa11370f8ed</CONDITION>
- <CONDITION>MD5=7F25B5FCD69D919C7469BE011F2B6BCC</CONDITION>
- <CONDITION>MD5=337E0AD583F40A772B04E202C501A270</CONDITION>
- <CONDITION>MD5=54BB2440C04013B8AD5E2428BB3578B4</CONDITION>
- <CONDITION>MD5=9F35C375DBB7F79B12F48ACFEEB5605D</CONDITION>
- <CONDITION>MD5=946A998BF4EF053DC1B49FCA0FB1C0FB</CONDITION>
- <CONDITION>MD5=1F76A4FF8266578EE5EBFC858DDD81D8</CONDITION>
- <CONDITION>MD5=630C5C0F5D85F0150E62DD306EFA4BCC</CONDITION>
- <CONDITION>MD5=9F35C375DBB7F79B12F48ACFEEB5605D</CONDITION>
- <CONDITION>MD5=1F76A4FF8266578EE5EBFC858DDD81D8</CONDITION>
- <CONDITION>MD5=B3CA933826C87ECB9FED3EBFE0063E5A</CONDITION>
- <CONDITION>MD5=A3777215AF593CFEFFB817C8B9EFAAA2</CONDITION>
- <CONDITION>MD5=35255C705D3B3E78B62339DA16267AB6</CONDITION>
- <CONDITION>MD5=8C30135E57A129D09CB42AB351CED9AF</CONDITION>
- <CONDITION>MD5=8B1E44001F91345AF15D28E44E89E404</CONDITION>
- <CONDITION>MD5=0008CB3E53C0E9C4EC3733D1D9E38B52</CONDITION>
- <CONDITION>MD5=4DA8E0D16D8DFD8A44DFAAA1781F0A0D</CONDITION>
- <CONDITION>MD5=95173E4DB2827E9D8FA5E260A73D9882</CONDITION>
- <CONDITION>MD5=52F924B711DF07579239994D78513F92</CONDITION>
- <CONDITION>MD5=FC93C3347245EEDEEC717D75617A30A4</CONDITION>
- <CONDITION>MD5=66A32D068F2313D22F38131C581ECE52</CONDITION>
- <CONDITION>MD5=03107871C2436D963C79FD27CFD80B6F</CONDITION>
- <CONDITION>MD5=B8BB97B03415356ED11A3B6D70A9A1B7</CONDITION>
- <CONDITION>MD5=925D05C0050FA496005D3F9B0C6632B5</CONDITION>
- <CONDITION>MD5=B60166286BEC9689AD912CD16C26F374</CONDITION>
- <CONDITION>MD5=AA487009D90D95222C55B88005FD6A57</CONDITION>
- <CONDITION>MD5=89B0C7661559260F86FE67FBCABD5F1E</CONDITION>
- <CONDITION>MD5=EC83012600F32073E42883C5FB20DB99</CONDITION>
- <CONDITION>MD5=1D583593C2E5DD828288D40635A6172A</CONDITION>
- <CONDITION>MD5=C1B746CFC68EB77A2B1E2ACFE422ECFD</CONDITION>
- <CONDITION>MD5=341FFBE84BDDDDB802B5B2AC4F834E18</CONDITION>
- <CONDITION>MD5=A284D0BC6E6E5860880072C54513C173</CONDITION>
- <CONDITION>MD5=054F0A9B670456B2B60DD6FAD148ADDC</CONDITION>
- <CONDITION>MD5=11D3245FC0F8AA8F0107963349528890</CONDITION>
- <CONDITION>MD5=5C830F0F1D8C73E51C28F40597602B25</CONDITION>
- <CONDITION>MD5=EB1E109832EC5CD8508A5CD2DAA6094B</CONDITION>
- <CONDITION>MD5=C8EC5745E1E6C4EB0375234D551E2517</CONDITION>
- <CONDITION>MD5=CF14C109BF38CAA22CC49A77A56C2667</CONDITION>
- <CONDITION>MD5=3F7D4E02E30105178318E16DBD4170AA</CONDITION>
- <CONDITION>MD5=C0F9EEB22B16210E37AB5D3297C490AB</CONDITION>
- <CONDITION>MD5=CB0B9A33307E60B91CE6EDCB5112FFA5</CONDITION>
- <CONDITION>MD5=33A67379067A07C0B1724320A64C8456</CONDITION>
- <CONDITION>MD5=36BCB2FF7213C6B8E452DF15AA74D4AC</CONDITION>
- <CONDITION>MD5=C9CA4F97892625766D7828A5A4C3191D</CONDITION>
- <CONDITION>MD5=99598CC79886A584B43714E34024B5C8</CONDITION>
- <CONDITION>MD5=D12128A0540F7871BC9012B115B5E7A8</CONDITION>
- <CONDITION>MD5=B15AFEA4C2B54A92FC06E8BE983F803D</CONDITION>
- <CONDITION>MD5=E5D7315AF002F94C9E76D58A1ADF1D09</CONDITION>
- <CONDITION>MD5=F2269D57007B1083B552687C041B40A4</CONDITION>
- <CONDITION>MD5=93975A48788EEAD53EDE40599CFEAB8E</CONDITION>
- <CONDITION>MD5=4811D6A69860E6B6B587C5FF0C67CCB3</CONDITION>
- <CONDITION>MD5=5D5A12E26F5CC510250DE3ECA39E626E</CONDITION>
- <CONDITION>MD5=12371CDE963679ABC5240FA32ECEA25A</CONDITION>
- <CONDITION>MD5=E316B302C6A5EF96C877B05E5AAEDAEB</CONDITION>
- <CONDITION>MD5=038F5CA3CA08B37105AEFC1780035BF5</CONDITION>
- <CONDITION>MD5=E90475F3681D0FA5FE9E544D902455E7</CONDITION>
- <CONDITION>MD5=977CB2B7BCD5AA59034541D26DDA36F2</CONDITION>
- <CONDITION>MD5=55946FAAC774912974C6A01F6BE194A6</CONDITION>
- <CONDITION>MD5=493A9271A7CADE2D31B79EA94FCE4EF6</CONDITION>
- <CONDITION>MD5=505D7AB5FA9B69296541B45C4AE0F01E</CONDITION>
- <CONDITION>MD5=476474EDFD1240E3FC73770D623CB331</CONDITION>
- <CONDITION>MD5=B5E64043AD802DAED82A9E1A94C83661</CONDITION>
- <CONDITION>MD5=5A2688417B19F13726206841AACE1E33</CONDITION>
- <CONDITION>MD5=A4F37B3DCF7511DFFC5AE436D8170E66</CONDITION>
- <CONDITION>MD5=DE77DEB6B28CB4C31313B968CB9A99F8</CONDITION>
- <CONDITION>MD5=96E261D4A44FDBE54E72860DD04CED07</CONDITION>
- <CONDITION>MD5=5364B38B6A50768EEA18F428058EED47</CONDITION>
- <CONDITION>MD5=995105EDBA807F5381D39F80868C0EF8</CONDITION>
- <CONDITION>MD5=5F7B4848802CB422A7F2F1747680D925</CONDITION>
- <CONDITION>MD5=7FFD062DE2641C856FC180BABBF4A3EB</CONDITION>
- <CONDITION>MD5=9C64AD64A0B2FF71B990203E0EDA04ED</CONDITION>
- <CONDITION>MD5=85252332F36CFB27DF705E52D93BE6A2</CONDITION>
- <CONDITION>MD5=17FCED19CC85F67373BAFA0043F56A38</CONDITION>
- <CONDITION>MD5=67F81F1960BBD876B7F65F5B615C7D7B</CONDITION>
- <CONDITION>MD5=64DF0A60E84EB1362C0A5C072AC516CB</CONDITION>
- <CONDITION>MD5=C2EBA321F904A44EC6471D40CAE6265F</CONDITION>
- <CONDITION>MD5=10134E570EAF4147FB1F099665856409</CONDITION>
- <CONDITION>MD5=9A69309AD32C4BEC20D63A9034D42445</CONDITION>
- <CONDITION>MD5=3F4489A2E29B0002ABA3F2DF3AAF3B69</CONDITION>
- <CONDITION>MD5=B83E339C7D62E91FA90E4CE3BCADDE35</CONDITION>
- <CONDITION>MD5=242897AAC49A46D4EC521E5379252835</CONDITION>
- <CONDITION>MD5=ECDB5C1B1A702DEDF03D6248CF6F6FF1</CONDITION>
- <CONDITION>MD5=6C1F85709A4DDD2364E64E621AE40502</CONDITION>
- <CONDITION>MD5=3B6D4A3E7A19384AE9ACDAC3FBE8A464</CONDITION>
- <CONDITION>MD5=C487080836CD3AEF48BBE2DAA540C954</CONDITION>
- <CONDITION>MD5=A42CBEF1C8EA0712C698A3CD8BC93098</CONDITION>
- <CONDITION>MD5=7AA1C76647E3D9A4A961A34583A195FF</CONDITION>
- <CONDITION>MD5=1EBAD53A88ADAFB65E56E6DEF8462C51</CONDITION>
- <CONDITION>MD5=DDCF499F093A6C03E826AEB65FEC0E0D</CONDITION>
- <CONDITION>MD5=B38BD6EDC0F42133F11E8B7EC3A6D4E0</CONDITION>
- <CONDITION>MD5=FC53DD4BDC7F7E18352FDC70B735102D</CONDITION>
- <CONDITION>MD5=A886C8CA6F90B0A5574F145D9C1A6E64</CONDITION>
- <CONDITION>MD5=3F1A39111089CE323CA1F12138B16F7A</CONDITION>
- <CONDITION>MD5=73798BEFA1743DBF4D8CD9A512B898AC</CONDITION>
- <CONDITION>MD5=3CD9207A12A0FFA8F562CCAF999AFD0C</CONDITION>
- <CONDITION>MD5=E66EA59DCAFBDD4C656FE2D57A2DE9CE</CONDITION>
- <CONDITION>MD5=E8DBE8DD3F8AA4EC7F5F11B489B1B3F1</CONDITION>
- <CONDITION>MD5=D7A8E6C7BE47E39AE5DEA5C97B6BE30D</CONDITION>
- <CONDITION>MD5=7EEC7BF62C6DDB9227CBD50629759A80</CONDITION>
- <CONDITION>MD5=0A2E12739876DE92B4BA4AC3D94C6B38</CONDITION>
- <CONDITION>MD5=86671287A8D093F21145368236F67AAD</CONDITION>
- <CONDITION>MD5=FC1C2E4E64328472FC79752A8FEF864A</CONDITION>
- <CONDITION>MD5=B1DC360E345FD8039E3A4FF00E95A65E</CONDITION>
- <CONDITION>MD5=61AF3A179B5A7E6BA23952B0F0700799</CONDITION>
- <CONDITION>MD5=194FA40D93CFE1F0EF828D24237DA722</CONDITION>
- <CONDITION>MD5=403C78A45F13337B2A7E776082E01E2B</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4181</ID>
- <PROCESSLIST>
- <PROCESS>MFCFQ.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME^Microsoft</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4182</ID>
- <PROCESSLIST>
- <PROCESS>SBSRV.EXE</PROCESS>
- <PROCESS>SBINST.EXE</PROCESS>
- <PROCESS>SBOEADDON.EXE</PROCESS>
- <PROCESS>SBWEATHERONTRAY.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar/SpamBlockerUtility.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4183</ID>
- <PROCESSLIST>
- <PROCESS>SBHOSTIE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{66B90ADB-0BE3-40AE-8680-84A6F0577CA0}</CLSID>
- <CLSID>{7E66936C-FEA0-4984-AD26-7B6661AC5B2E}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar/SpamBlockerUtility.Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4184</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(WAUCLT~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=459AC8EF83898533B94785BBA38FEFBE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4187</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RVICES~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=89EF5E5222BF109895C2A22D958E155D</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4188</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>WPJBZOSX.EXE</PROCESS>
- <PROCESS>TMWRIUQD.EXE</PROCESS>
- <PROCESS>PLFZIGBD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=B119A414D5481E6F062038016CBCB738</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4189</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>SHPRRPRT.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.HotBar/ShopperReports.Explorer Bar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4198</ID>
- <PROCESSLIST>
- <PROCESS>DLMAX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000000-59D4-4008-9058-080011001200}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Transponder Variant.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4199</ID>
- <PROCESSLIST>
- <PROCESS>RSYNCMON.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{16B238D5-80DE-47CE-8F17-B3ECE2C2248D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.RsyncMon.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4201</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PPDISP10.DLL</PROCESS>
- <PROCESS>PSICS3.DLL</PROCESS>
- <PROCESS>REGNEW~1.DLL</PROCESS>
- <PROCESS>KEYWORDZ3.DLL</PROCESS>
- <PROCESS>DSV5.DLL</PROCESS>
- <PROCESS>CTSR5.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{DB0018A2-F7D9-4B71-9651-640143DF23F9}</CLSID>
- <CLSID>{B6598677-4B54-42A9-BA67-8B64E3FCD92D}</CLSID>
- <CLSID>{AEFCDEC8-EB7D-429F-BC73-4F30D07BFE41}</CLSID>
- <CLSID>{858126B0-3708-4051-AE8E-B48521401CA2}</CLSID>
- <CLSID>{573E8D87-26A8-4FC3-8C89-2792E39F22C8}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.EZSearching.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>9</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4202</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(NPDB~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=CB6B95EBD3899A60C72EC5A14DDA3EBA</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4203</ID>
- <PROCESSLIST>
- <PROCESS>WINCLT.EXE</PROCESS>
- <PROCESS>WINAD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.WinAd Client.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~WINAD</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4204</ID>
- <PROCESSLIST>
- <PROCESS>WINSX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A9AEE0DD-89E1-40EE-8749-A18650CC2175}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Popup Module.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4214</ID>
- <PROCESSLIST>
- <PROCESS>DSKMGR32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Uncategorized.Dskmgr32.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~dskmgr32</CONDITION>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4215</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PRUTRCT.EXE</PROCESS>
- <PROCESS>PRUTQCT.EXE</PROCESS>
- <PROCESS>PRUTPCT.EXE</PROCESS>
- <PROCESS>PRUTOCT.EXE</PROCESS>
- <PROCESS>PRUTNCT.EXE</PROCESS>
- <PROCESS>PRUTMCT.EXE</PROCESS>
- <PROCESS>PRUTSCT.EXE</PROCESS>
- <PROCESS>PRUTTCT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.PTech.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~PTech</CONDITION>
- <CONDITION>MD5=82AF1FCBE157EBA3498CD97F8D6D2358</CONDITION>
- <CONDITION>MD5=70955E7B3E4C462D06F56584F6CDF785</CONDITION>
- <CONDITION>MD5=A2177885D0184798B2436526AA757344</CONDITION>
- <CONDITION>MD5=F258A63EB0970925781BB48585589139</CONDITION>
- <CONDITION>MD5=7FBE8FE7DEF209E84796981E4038C347</CONDITION>
- <CONDITION>MD5=BB01DC49079B3FA2E2DCF8E54EBEF30C</CONDITION>
- <CONDITION>MD5=F097001A129545C626DE4C64C93DDD32</CONDITION>
- <CONDITION>MD5=700BECACFBA5F50676C00CA2BF751201</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4217</ID>
- <PROCESSLIST>
- <PROCESS>PRGSYS0984.DLL</PROCESS>
- <PROCESS>SDKIR.DLL</PROCESS>
- <PROCESS>APPTB.DLL</PROCESS>
- <PROCESS>METEVUT.EXE</PROCESS>
- <PROCESS>IEAZ32.DLL</PROCESS>
- <PROCESS>NETHP.DLL</PROCESS>
- <PROCESS>APITM.DLL</PROCESS>
- <PROCESS>APIZN32.DLL</PROCESS>
- <PROCESS>ATLBA.DLL</PROCESS>
- <PROCESS>CMON14.DLL</PROCESS>
- <PROCESS>CONTROL64.DLL</PROCESS>
- <PROCESS>D3HX32.DLL</PROCESS>
- <PROCESS>D3MO32.DLL</PROCESS>
- <PROCESS>CRPB32.DLL</PROCESS>
- <PROCESS>MSSF.DLL</PROCESS>
- <PROCESS>IPIC32.DLL</PROCESS>
- <PROCESS>XXTOOLBAR.DLL</PROCESS>
- <PROCESS>AAAVICA.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A0C11525-6C6C-8D6E-342F-4EBBC2B6FDAF}</CLSID>
- <CLSID>{6172A751-F518-736A-C48A-B6E0875958BD}</CLSID>
- <CLSID>{729C8736-0F18-3F7A-E5BB-A9B57E2CDBEC}</CLSID>
- <CLSID>{F5D6CF24-9209-B523-45E8-76F500B344BD}</CLSID>
- <CLSID>{964E2124-4EFC-8478-D558-FA3F46CA1604}</CLSID>
- <CLSID>{E2D18933-6CA1-461A-2D30-CC986B408A2C}</CLSID>
- <CLSID>{BBF5E38D-037F-77FE-1BD4-D0175630EF03}</CLSID>
- <CLSID>{481958D3-16E4-9C16-944F-E7FE88EE3515}</CLSID>
- <CLSID>{2044C94E-DD20-CD28-309F-B10CD072EDA6}</CLSID>
- <CLSID>{C47E6E10-C0C5-AEF2-931D-EF6F0A8C9297}</CLSID>
- <CLSID>{873B0274-4BA2-74B9-39E1-DF2C9CB405F8}</CLSID>
- <CLSID>{9A9D9913-F539-B818-1427-A8E89535E89C}</CLSID>
- <CLSID>{F7AD1C87-A22D-2ADE-8709-D877F23F4F05}</CLSID>
- <CLSID>{5C72B122-9904-E5BD-4093-348A5AD1BEF5}</CLSID>
- <CLSID>{1894A818-B4B1-10DE-96D0-57373BDB407E}</CLSID>
- <CLSID>{0B478A5F-80D3-2FF6-AF0E-5653B825ADD2}</CLSID>
- <CLSID>{0A02863D-F686-31D4-9AE0-525F10771D21}</CLSID>
- <CLSID>{8AE3AEDB-B735-4883-DCF6-362F310E5CA7}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4232</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(OOL32~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=07F5C534814BE004F5B13F18337F664E</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4233</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>NE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D5C778F1-CF13-4E70-ADF0-45A953E7CB8B}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.SmartPops.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4234</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>PERFEC~1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{A045DC85-FC44-45BE-8A50-E4F9C62C9A84}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.IncrediFind.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4235</ID>
- <PROCESSLIST>
- <PROCESS>SVCHOSTA.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Spybot Variant.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4236</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RNDLL~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=E2AED400C7754B98C378F8262DFFBBE2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4237</ID>
- <PROCESSLIST>
- <PROCESS>MANAGE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Jraun/WinEssential.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>FILEDESCRIPTION~version</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4238</ID>
- <PROCESSLIST>
- <PROCESS>EZSYS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.eZula.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~WebOffer</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4239</ID>
- <PROCESSLIST>
- <PROCESS>YMSNGR.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Spybot Variant.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4243</ID>
- <PROCESSLIST>
- <PROCESS>HYPERBARSS3.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- </CLSIDLIST>
- <SUMMARY>HyperSearchHook URL Search Hook Variant</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4244</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=B556FE5A548379B9FEC866900BE9A0DB</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4245</ID>
- <PROCESSLIST>
- <PROCESS>IEXPLORR24.DLL</PROCESS>
- <PROCESS>IEXPLORR23.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6B12DABB-0B7C-44FA-B0B3-4BAFF3790256}</CLSID>
- <CLSID>{4CEBBC6B-5CEE-4644-80CF-38980BAE93F6}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.IExplorr.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>6</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4246</ID>
- <PROCESSLIST>
- <PROCESS>X2FF.DLL</PROCESS>
- <PROCESS>X0FF.DLL</PROCESS>
- <PROCESS>CSA.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{AC109D01-32D6-4EB5-8300-D3C5EBAC7C83}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearStream Accelerator (Riversoft).BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4251</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Rundll32/ewizard.cc.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMMANDLINE~SE.DLL</CONDITION>
- <CONDITION>COMMANDLINE~DllInstall</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4252</ID>
- <PROCESSLIST>
- <PROCESS>SE.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Rundll32/ewizard.cc.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=2e8ff8927c53f9852a4293d8223727e5</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4254</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>INTERNALNAME~LoaderUpdater</CONDITION>
- <CONDITION>PRODUCTNAME~ClearSearch</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4255</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.Browser Extension</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=056aa09a76cdc2f3872fe44a1508cdf7</CONDITION>
- <CONDITION>MD5=31d98ad4b5d82fe353d294e965ff28eb</CONDITION>
- <CONDITION>MD5=374dc8f65d881f534c5d92f84e2b493c</CONDITION>
- <CONDITION>MD5=78c3432dfa6c02e58cebaeefd7b13d65</CONDITION>
- <CONDITION>MD5=88442aa69f04b79cb53e46cae032ef56</CONDITION>
- <CONDITION>MD5=b7632d36abd9e440f87c4171ca2bb3e1</CONDITION>
- <CONDITION>MD5=be7a499e4ca8cdd4b1b8e42e1371cd74</CONDITION>
- <CONDITION>MD5=c90758f507aac9e54b4ae599c2a30591</CONDITION>
- <CONDITION>MD5=d1645a1168ccc53643e4c50ea2a3152e</CONDITION>
- <CONDITION>MD5=d8569e0a499d4260b3dcc2b9698c62f9</CONDITION>
- <CONDITION>MD5=dcb235a98bfef12e1e8cf2eb991deef9</CONDITION>
- <CONDITION>MD5=e280063a5d40be6394685d1b7ac2e874</CONDITION>
- <CONDITION>MD5=f7fa1f2a3ac046e4ab678a685fb1ee1f</CONDITION>
- <CONDITION>MD5=D1D57D7D3BD3845EFA6FB13D4739CFC1</CONDITION>
- <CONDITION>MD5=EA4ABA2B73AF78A3D033ADFF406662A5</CONDITION>
- <CONDITION>MD5=76A1C1173B17AAB5ABBA88C89684609E</CONDITION>
- <CONDITION>MD5=C983217EEF5BB3F097FA71DE00C87A25</CONDITION>
- <CONDITION>MD5=49D255EAFC3D418FFA7BCFC69451829E</CONDITION>
- <CONDITION>MD5=6DF9D89DBC66474DCCE3AC4C5CA9A3F1</CONDITION>
- <CONDITION>MD5=11D19B2A3603F929495AC0D4C07FF834</CONDITION>
- <CONDITION>MD5=BA856E4E3C32BFB790F045D2EDAB6FA5</CONDITION>
- <CONDITION>MD5=FB1ECDA90A4A5FA56FA66FD537819F0C</CONDITION>
- <CONDITION>MD5=E132E227D1693224C819EDB848B62C6D</CONDITION>
- <CONDITION>MD5=FDA0C89EC91676F3D456253C6FF78E3F</CONDITION>
- <CONDITION>MD5=70DE6B567737F35E0AC2FABF78F8F988</CONDITION>
- <CONDITION>MD5=EA8BE6444E3E9ED5BF1419727FE04F32</CONDITION>
- <CONDITION>MD5=BEBF234359020665C7912C0B05D79F44</CONDITION>
- <CONDITION>MD5=12975846794976ACDF9661CCAB385F89</CONDITION>
- <CONDITION>MD5=DAE25AFBA1EF979CD3DAD6E2E8585298</CONDITION>
- <CONDITION>MD5=984A1A552E49A92CB4E01F40222CF29B</CONDITION>
- <CONDITION>MD5=B360B92F1AE5A5E4298B7128921B69E9</CONDITION>
- <CONDITION>MD5=D983FECF5C0D2EA0C0CAE2B251F5C1CB</CONDITION>
- <CONDITION>MD5=056FC291F011B44F307338B65D05F6CF</CONDITION>
- <CONDITION>MD5=0A984C84570C8CCF2C23168A0222C1F7</CONDITION>
- <CONDITION>MD5=540B4CB7D9B3275DC47E140807BB6A6C</CONDITION>
- <CONDITION>MD5=044A1C5AED8AA776CFC248C6BD14B88A</CONDITION>
- <CONDITION>MD5=CAF687FCDB536BE5D2705DFB47A45A4E</CONDITION>
- <CONDITION>MD5=D1C099DA6E1BDD6E3C860DE8AA302894</CONDITION>
- <CONDITION>MD5=1D28AA1B699CA6F39BD59AC49A47AD0D</CONDITION>
- <CONDITION>MD5=F631111E0FB259C96A90C52E22553E3E</CONDITION>
- <CONDITION>MD5=86C2B313F7D0DFFA747FEA26A1D35C51</CONDITION>
- <CONDITION>MD5=5695EFB8E1A1DA18B876F5D3EE382118</CONDITION>
- <CONDITION>MD5=4CB7D7F783205218BA334FA9F66DB4F8</CONDITION>
- <CONDITION>MD5=7B9124E96804A3148A20A7B31749D642</CONDITION>
- <CONDITION>MD5=CCD0C6AA81409C2F7F39E7D379B4A9F4</CONDITION>
- <CONDITION>MD5=94847DE05B438674C7A791BB80483BAC</CONDITION>
- <CONDITION>MD5=4774B47E7502D651E4714158B8394FA4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4256</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=056aa09a76cdc2f3872fe44a1508cdf7</CONDITION>
- <CONDITION>MD5=31d98ad4b5d82fe353d294e965ff28eb</CONDITION>
- <CONDITION>MD5=374dc8f65d881f534c5d92f84e2b493c</CONDITION>
- <CONDITION>MD5=78c3432dfa6c02e58cebaeefd7b13d65</CONDITION>
- <CONDITION>MD5=88442aa69f04b79cb53e46cae032ef56</CONDITION>
- <CONDITION>MD5=b7632d36abd9e440f87c4171ca2bb3e1</CONDITION>
- <CONDITION>MD5=be7a499e4ca8cdd4b1b8e42e1371cd74</CONDITION>
- <CONDITION>MD5=c90758f507aac9e54b4ae599c2a30591</CONDITION>
- <CONDITION>MD5=d1645a1168ccc53643e4c50ea2a3152e</CONDITION>
- <CONDITION>MD5=d8569e0a499d4260b3dcc2b9698c62f9</CONDITION>
- <CONDITION>MD5=dcb235a98bfef12e1e8cf2eb991deef9</CONDITION>
- <CONDITION>MD5=e280063a5d40be6394685d1b7ac2e874</CONDITION>
- <CONDITION>MD5=f7fa1f2a3ac046e4ab678a685fb1ee1f</CONDITION>
- <CONDITION>MD5=D1D57D7D3BD3845EFA6FB13D4739CFC1</CONDITION>
- <CONDITION>MD5=AF1C1EA26B136782791F8788C3589787</CONDITION>
- <CONDITION>MD5=FDCAF93CFFB6ADD5FD0A55C86E352E45</CONDITION>
- <CONDITION>MD5=E3E9537283AF06648A6A6F0F9D201B88</CONDITION>
- <CONDITION>MD5=E0DF2BB3568CBDAEAC223444B495508D</CONDITION>
- <CONDITION>MD5=F2C70D0BB07D318D2F264994D33803C1</CONDITION>
- <CONDITION>MD5=04C926F8F4FB856C9E4BF964C752177B</CONDITION>
- <CONDITION>MD5=D22CFF420BF21DF72C5ADB5F3C5DCCB6</CONDITION>
- <CONDITION>MD5=6BD9F90D75AC62A8294EB55A0ADB1207</CONDITION>
- <CONDITION>MD5=82F0217A522F66EEB936FCEC0C559F00</CONDITION>
- <CONDITION>MD5=3E51E3559F08FBDE08B521F7738D2D54</CONDITION>
- <CONDITION>MD5=519CC30817C90033CBF340F9E73085CA</CONDITION>
- <CONDITION>MD5=B78618C53048ECCE428136FA2203895A</CONDITION>
- <CONDITION>MD5=D211656A6D8B608B8B4D2B2D5817E8DF</CONDITION>
- <CONDITION>MD5=B689BBF2DF9F1E2F77B9AD595FDC351E</CONDITION>
- <CONDITION>MD5=8345CD6A81062C824CC81DB742FC0252</CONDITION>
- <CONDITION>MD5=DF5829AB7AA5C01C59A4E6F724EAD9F2</CONDITION>
- <CONDITION>MD5=8DD59D4D8F1186C4690207376C42585F</CONDITION>
- <CONDITION>MD5=0F646EEB870B524DBA9E543A77D78F15</CONDITION>
- <CONDITION>MD5=3EE2D713A82598D723480A7E0DDFD07E</CONDITION>
- <CONDITION>MD5=2D1E8844484C95D1538AB50410CD8374</CONDITION>
- <CONDITION>MD5=1CC030F1ED3C31C2FDBFEED8E533C4F8</CONDITION>
- <CONDITION>MD5=D10C463AF17E3D7132B11F3DE86E65FC</CONDITION>
- <CONDITION>MD5=5A66087A032EAAA9E08F08981C0EF9AF</CONDITION>
- <CONDITION>MD5=05C780107BAC553669B52D1552927773</CONDITION>
- <CONDITION>MD5=5F811909E605759A5A97C673C060EE1B</CONDITION>
- <CONDITION>MD5=BE7E5BD48357090E740943C8A42A96CD</CONDITION>
- <CONDITION>MD5=B837A7DF4EB61123501A12DCEFF05997</CONDITION>
- <CONDITION>MD5=01B6E2DF0F1EF7C622D9613F4F5C2C4D</CONDITION>
- <CONDITION>MD5=E42432AD10CB93FF28A99551AA6CF9C2</CONDITION>
- <CONDITION>MD5=FFD05DBC6DC79402336DF929F6EAD5B5</CONDITION>
- <CONDITION>MD5=C34645FA5C2D8D75A892CA974508CB4C</CONDITION>
- <CONDITION>MD5=C6129C27536598A0CD523ED0EF054C4E</CONDITION>
- <CONDITION>MD5=93870F15FF55E5930D402820CF85F121</CONDITION>
- <CONDITION>MD5=2750E09F684E42B2BD81066218324515</CONDITION>
- <CONDITION>MD5=AB9A209B6076186408D043D3E963B654</CONDITION>
- <CONDITION>MD5=CA6A59F194C1ACAADF2C1850F46854E3</CONDITION>
- <CONDITION>MD5=ACDA4A5B5C6114A0D9D2D5FA21FC5267</CONDITION>
- <CONDITION>MD5=558AB13E63627CEEB4DA0B81903E5C3A</CONDITION>
- <CONDITION>MD5=6A1CDDD01AECF494A42659E9D559F0E8</CONDITION>
- <CONDITION>MD5=08EA364AB946A3DB89C81F683A9007A3</CONDITION>
- <CONDITION>MD5=FEB0A3CE2018630FBFE804BBE85440BE</CONDITION>
- <CONDITION>MD5=8069FEAF5114F2C5F14E3F37BF8D0A96</CONDITION>
- <CONDITION>MD5=C096722FE2B27B8F21980BEE19AFB382</CONDITION>
- <CONDITION>MD5=4DA76CD2ACF0ED48D8D6502B6346EAD4</CONDITION>
- <CONDITION>MD5=941F14F388A787D5B469B0B74B4818E0</CONDITION>
- <CONDITION>MD5=D951DE82A903E2220346233246A4D423</CONDITION>
- <CONDITION>MD5=FBB6BD565ACA02D58D9ED8CF42C54560</CONDITION>
- <CONDITION>MD5=23CF0BBAC10E24EE396083FFDA63F6E4</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4258</ID>
- <PROCESSLIST>
- <PROCESS>MEDIAPASSK.EXE</PROCESS>
- <PROCESS>MEDIAPASS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Media Pass.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~Media</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4259</ID>
- <PROCESSLIST>
- <PROCESS>ZETA.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Zesoft.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~WINDOWS</CONDITION>
- <CONDITION>FILELOCATION~WINNT</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>9</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4262</ID>
- <PROCESSLIST>
- <PROCESS>MSCONFG.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Rbot.H.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4263</ID>
- <PROCESSLIST>
- <PROCESS>WINSYSTEM32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Rbot-UO.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4264</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(YWXBHL.EXE)</PROCESS>
- <PROCESS>(YEMAUN.EXE)</PROCESS>
- <PROCESS>(AUGYGE.EXE)</PROCESS>
- <PROCESS>(UCHQKF.EXE)</PROCESS>
- <PROCESS>(PEZUML.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Redirect.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILEDESCRIPTION~Redirect MFC Application</CONDITION>
- <CONDITION>PRODUCTNAME~Redirect Application</CONDITION>
- <CONDITION>ORIGINALFILENAME~Redirect.EXE</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4282</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>TRGEN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{22B720C7-5FA6-40A8-9F8F-8584BF669690}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Begin2Search.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4283</ID>
- <PROCESSLIST>
- <PROCESS>USERINIT32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Petch.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4284</ID>
- <PROCESSLIST>
- <PROCESS>OPEN32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4285</ID>
- <PROCESSLIST>
- <PROCESS>AUF0.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Apropos Media.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~Temp</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4286</ID>
- <PROCESSLIST>
- <PROCESS>SUBMITHOOK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2E9CAFF6-30C7-4208-8807-E79D4EC6F806}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Submithook.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4288</ID>
- <PROCESSLIST>
- <PROCESS>IEXPLORERRS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Rbot-TN.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4289</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.180solutions/Search Assistant.Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=299797b006b10852fc9d32fae70509ee</CONDITION>
- <CONDITION>MD5=16b594abb8cd7dc37e8313303ad2ab00</CONDITION>
- <CONDITION>MD5=7a14373df7aabdb7137a5f5d5e179bc5</CONDITION>
- <CONDITION>MD5=2f4b431446173bf74fd01a4a3198ad12</CONDITION>
- <CONDITION>MD5=1700207bbbeb7057ceeae01fcf975915</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4290</ID>
- <PROCESSLIST>
- <PROCESS>SIDEFIND.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.IST/SideFind.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~sidefind</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4291</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.IST/SideFind.Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=7baa8e57c95df9993dcc0d5022f9bf72</CONDITION>
- <CONDITION>MD5=0afa4352f84e9ac3d8d3b2159ebbdb49</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4293</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DESKWA~1.DLL</PROCESS>
- <PROCESS>DESKWAREDOWNLOADER.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{88F0297D-A046-4942-B6B9-03D8939E92D5}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Deskware.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4295</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>FYS153E.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{88CC91DE-5930-45AD-9E04-6B1233609FEA}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.Appolinaria Media.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4296</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IC2_WIN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{988CAFC4-DC0D-4D8C-A35E-5028ABE9E641}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Begin2Search.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4298</ID>
- <PROCESSLIST>
- <PROCESS>SRNG.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Srng/ShopNav.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~SRNG</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4299</ID>
- <PROCESSLIST>
- <PROCESS>SVCHOST.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Svchost.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=EF05DCCC255103750092F5FCB7E47D30</CONDITION>
- <CONDITION>MD5=2AB3890B262269B36DE92340E3468A05</CONDITION>
- <CONDITION>MD5=371D4EA00B8422DBDE293DAE90ACF698</CONDITION>
- <CONDITION>MD5=438741660A5A78C60DF49FF5334D0B76</CONDITION>
- <CONDITION>MD5=86E38397751C41748ECD47094A274369</CONDITION>
- <CONDITION>MD5=EE8990B5D076A7ED601A30EB677CC9BE</CONDITION>
- <CONDITION>MD5=45912A9CCE2F1F9A252E0AECDF605C4D</CONDITION>
- <CONDITION>MD5=F5C7F75369632DD41D80BFF03C0B514B</CONDITION>
- <CONDITION>MD5=C33AB66C9C72D1F40357BDB80E51F28F</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4300</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Lop.Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=ef5ff3569b3470bbc6d685a94ac0cc64</CONDITION>
- <CONDITION>MD5=62228a4130589eadc5c2a3d9924eea71</CONDITION>
- <CONDITION>MD5=8a371bb9939c3ff6f50bbc1d5172456c</CONDITION>
- <CONDITION>MD5=6639789dfb899f5d956f2a77926c25cd</CONDITION>
- <CONDITION>MD5=7651c44a511641e4b525bfa5f00c362b</CONDITION>
- <CONDITION>MD5=6639789dfb899f5d956f2a77926c25cd</CONDITION>
- <CONDITION>MD5=90ff61349861c680cb03c54fb7a3a7d9</CONDITION>
- <CONDITION>MD5=62228a4130589eadc5c2a3d9924eea71</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4305</ID>
- <PROCESSLIST>
- <PROCESS>WINSRVS_1.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000015-A527-34E7-25C2-03A4E313B2E9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.WinSrvs.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4308</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>IC2_WIN.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{207AEF46-0596-4966-A7BF-098F247E85BB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Begin2Search.Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4309</ID>
- <PROCESSLIST>
- <PROCESS>CLEARSEARCH.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>*</CLSID>
- <CLSID>{0466BEC3-BA38-4350-B03F-8B952E3D56F3}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.ClearSearch.Browser Extension</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~CLEAR</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4310</ID>
- <PROCESSLIST>
- <PROCESS>MEDIAACCESS.EXE</PROCESS>
- <PROCESS>MEDIAACCK.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Media Access.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~Media</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4312</ID>
- <PROCESSLIST>
- <PROCESS>WINLINK.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{6CC1C91A-AE8B-4373-A5B4-28BA1851E39A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Parasite.CoolWebSearch Variant.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>PARASITE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4313</ID>
- <PROCESSLIST>
- <PROCESS>SHELLEXP.EXE</PROCESS>
- <PROCESS>SHELLEXPL.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Sheldor.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4314</ID>
- <PROCESSLIST>
- <PROCESS>RUNDLL32M.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>COMPANYNAME^Microsoft</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4315</ID>
- <PROCESSLIST>
- <PROCESS>REGISTRY.PIF</PROCESS>
- <PROCESS>CRITICALUPDATE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Affilred.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=787A7432FD4C6331264FE7C5466DC09B</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4317</ID>
- <PROCESSLIST>
- <PROCESS>SPEERYOX.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{00000097-7C67-4BA6-8B42-05128941688A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4320</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.DealsOnline.Component</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- <CONDITION>PRODUCTNAME~DealsOnline</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>5</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4321</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DLL.DLL</PROCESS>
- <PROCESS>QWE1316.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{9EAC0102-5E61-2312-BC2D-444C4C4F5552}</CLSID>
- <CLSID>{CF021F40-3E14-23A5-CBA2-717177651316}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.Tubby.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4322</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>ELITEOWM32.EXE</PROCESS>
- <PROCESS>ELITEDUH32.EXE</PROCESS>
- <PROCESS>ELITEIEZ32.EXE</PROCESS>
- <PROCESS>ELITEUHN32.EXE</PROCESS>
- <PROCESS>ELITEZEZ32.EXE</PROCESS>
- <PROCESS>ELITEGSX32.EXE</PROCESS>
- <PROCESS>ELITEXOM32.EXE</PROCESS>
- <PROCESS>ELITEUEJ32.EXE</PROCESS>
- <PROCESS>ELITEUWW32.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=A648B15E377AD3A001DC0F89FA81DF09</CONDITION>
- <CONDITION>MD5=39EB6705EF3936D61E168ABDE344BF98</CONDITION>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4324</ID>
- <PROCESSLIST>
- <PROCESS>SYSPRINTER.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Trojan.SMALL_ZY.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>TROJAN</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4325</ID>
- <PROCESSLIST>
- <PROCESS>WEBSECUREALERT.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>GAIN WebSecureAlert</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>COMPANYNAME~GAIN</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>3</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4326</ID>
- <PROCESSLIST>
- <PROCESS>MSLAUGH.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Blaster Variant.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4327</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>VERNN16.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{7DD896A9-7AEB-430F-955B-CD125604FDCB}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.DailyWinner.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4331</ID>
- <PROCESSLIST>
- <PROCESS>BPCV2.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.BroadcastPC.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~BPC</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4336</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>HALFLE~1.DLL</PROCESS>
- <PROCESS>HALFLEMON.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{D94AAA2A-C415-42E3-82B6-49FAB4EBFFE9}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Browser Hijacker.HalfLemon.URL Search Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>BROWSERHIJACKER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4337</ID>
- <PROCESSLIST>
- <PROCESS>DXCONF.EXE</PROCESS>
- <PROCESS>TRUETTF.EXE</PROCESS>
- <PROCESS>CONNMIE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4338</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>DXCONF.EXE</PROCESS>
- <PROCESS>TRUETTF.EXE</PROCESS>
- <PROCESS>CONNMIE.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Unknown Origin.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=BEF7FB508CB8BE08E89E0EE6200EA8F9</CONDITION>
- <CONDITION>MD5=D3820577DA862323FA5BC23AEFEC2D45</CONDITION>
- <CONDITION>MD5=DD75326DE47306EA2BE7715BAD4695A4</CONDITION>
- <CONDITION>MD5=0097552C8CC92E05FD0C82850D2E47C2</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>OR</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4339</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(GFXRRUSI.EXE)</PROCESS>
- <PROCESS>(YSPRINTS.EXE)</PROCESS>
- <PROCESS>(SMYPICSS.EXE)</PROCESS>
- <PROCESS>(DXOFD3.EXE)</PROCESS>
- <PROCESS>(UAUENGW.EXE)</PROCESS>
- <PROCESS>(_950C.EXE)</PROCESS>
- <PROCESS>(PLAY32M.EXE)</PROCESS>
- <PROCESS>(REDUIC.EXE)</PROCESS>
- <PROCESS>(QTRIGM.EXE)</PROCESS>
- <PROCESS>(MLOGCFGS.EXE)</PROCESS>
- <PROCESS>(ERFFILTP.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Thumbviewer/Rico.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=370EEDD2B785210973647AF5B3C21459</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4340</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(KILLUSA.EXE)</PROCESS>
- <PROCESS>(CDTWTOURDLL.SCR)</PROCESS>
- <PROCESS>(DOSAPLOGDRV.BAT)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Darby/KillUSA.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=C7A286A790FCB6B93264B2CC26522CF3</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4342</ID>
- <PROCESSLIST>
- <PROCESS>ADSERVERNOW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.AdServerNow.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4343</ID>
- <PROCESSLIST>
- <PROCESS>DOSXPD.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.Dosxpd.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4345</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(DXPLOR~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=480D8DD4F61ECFEC8DD8FC5851FF85F1</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4346</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>(RGEDIT~1.EXE)</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.ClickSpring.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=9D037FB229BC215C18C9B19C00E01AD6</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4347</ID>
- <PROCESSLIST>
- <PROCESS>MSW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.MSW.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME~MSW.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4348</ID>
- <PROCESSLIST>
- <PROCESS>EMSW.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Spyware.Alset/Emsw.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>SPYWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>ORIGINALFILENAME~emsw.exe</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4349</ID>
- <PROCESSLIST>
- <PROCESS>MSW.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4B57B77A-B130-4EB8-8CFB-42B880F6D311}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Unclassified.MSW.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>8</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4350</ID>
- <PROCESSLIST>
- <PROCESS>MSWEBHLP.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{DECA39C1-F713-11D2-BA99-0080C8E9491A}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Keylogger.SpectorSoft/eBlaster.Shell Execute Hook</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>KEYLOGGER</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>7</THREATLEVEL>
- <TERMINATEACTION>NOTIFY</TERMINATEACTION>
- <TERMINATIONMETHOD>---------</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4351</ID>
- <PROCESSLIST>
- <PROCESS>XPJAVA.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Rbot-YC.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4361</ID>
- <PROCESSLIST>
- <PROCESS>PWRSCZNC.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{4E7BD74F-2B8D-469E-D1F0-E56FA787AD2D}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.KeenValue(PowerSearch).Toolbar</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4384</ID>
- <PROCESSLIST>
- <PROCESS>WINRES.DLL</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- <CLSID>{2D38A51A-23C9-48A1-A33C-48675AA2B494}</CLSID>
- </CLSIDLIST>
- <SUMMARY>Adware.CoolWebSearch.Variant.BHO</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4386</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- <PROCESS>CMD32.EXE</PROCESS>
- <PROCESS>LOADCLEAN.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Unclassified.Cmd32.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>UNDEFINEDTHREAT</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=4D4A4D3126D360102D2F688D38DA4EFF</CONDITION>
- <CONDITION>MD5=22908E27499048EE5F3E86BBB67E1BC8</CONDITION>
- <CONDITION>MD5=656A12741EB0B593772FBF5B0870A8F3</CONDITION>
- <CONDITION>MD5=F82DE4ADD0EA20B99F8323529EC07696</CONDITION>
- <CONDITION>MD5=4DF55EC2027B8BF1DB213A107698336F</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4387</ID>
- <PROCESSLIST>
- <PROCESS>WUAMGRDS.EXE</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Worm.Sdbot-AWP.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>WORM</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>FILELOCATION~system</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- <PROCESSDESCRIPTOR>
- <ID>4388</ID>
- <PROCESSLIST>
- <PROCESS>*</PROCESS>
- </PROCESSLIST>
- <CLSIDLIST>
- </CLSIDLIST>
- <SUMMARY>Adware.OfferAgent.Process</SUMMARY>
- <DEFAULTINSTALLPATHLIST>
- </DEFAULTINSTALLPATHLIST>
- <CATEGORY>ADWARE</CATEGORY>
- <CONDITIONLIST>
- <CONDITION>MD5=F0BBBFFD97D436FF1032C50038D23337</CONDITION>
- </CONDITIONLIST>
- <OPERATOR>AND</OPERATOR>
- <THREATLEVEL>10</THREATLEVEL>
- <TERMINATEACTION>TERMINATE</TERMINATEACTION>
- <TERMINATIONMETHOD>KILLPROCESS</TERMINATIONMETHOD>
- </PROCESSDESCRIPTOR>
- </SABSCRIPT>