2000 A system change was detected. This generally occurs when software is installed.
2001 A program that displays advertisements. While some adware can be beneficial by subsidizing a program or service, other adware programs may display advertisements without adequate consent.
2002 A program that collects information, such as the websites a user visits, without adequate consent. Unauthorized actions may include installing without prominent notice or running without a clear method to disable the program.
2003 A Trojan that captures or transmits passwords to an attacker.
2004 A Trojan that silently installs other programs without consent.
2005 Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections.
2006 A Trojan used to bypass security policies or gain access to a computer.
2008 A program that appears to be useful or harmless but contains hidden code designed to exploit or damage the system on which it is run.
2009 A Trojan designed to overwhelm an e-mail user's inbox with messages.
2011 A Trojan that uses the computer's modem to generate unauthorized telephone charges.
2012 A program that monitors activity, such as keystrokes or screen images.
2013 A program that changes browser settings, such as the home page, without adequate consent.
2019 A program designed to amuse or scare a user, such as imitating a virus without taking action.
2021 A program that installs other potentially unwanted software, such as adware or spyware. The license agreement of the bundling program may require these other components in order to function.
2022 A Trojan used to notify an attacker when the software has been installed.
2023 A program that changes settings without adequate consent.
2027 A program with potentially unwanted behavior that is brought to the user's attention for review. This behavior may impact the user's privacy, security, or computing experience.
2030 A program that exploits a security vulnerability.
2031 A program used to distribute and download files, often as part of a peer-to-peer (P2P) network.
2032 A tool used to create viruses, worms and other malware.
2033 A program that provides access to a computer from a remote location. These programs are often installed by the computer owner or administrator, and are only a risk if unexpected.
2034 A tool that can be abused by an attacker, and may be used to bypass or lower security.
2036 A program that creates a Denial of Service attack.
2037 A program that comes bundled with a Trojan.
2038 A Trojan that sends large volumes of e-mail.
2039 A Trojan that records user activity, such as keystrokes. This information may be sent to an attacker using e-mail or other methods.
2040 A Trojan that installs a proxy server on a machine.
2042 Malicious code that attempts to spread from computer to computer by attaching itself to a host program.
2043 A program that has been classified and permitted to run.
2044 A program that has not yet been classified.
3001 This program delivers potentially unwanted advertisements to your computer.
3002 This program appears to be a spyware removal software, but does not disclose advertising behavior.
3003 This program displays advertisments separate from the parent program.
3004 This program displays pop-up advertisements.
3005 This program displays advertisements based on Web browsing habits.
3006 This program displays advertisements with adult content.
3007 This program displays advertisements and is often bundled with other programs.
3008 This program displays advertisements and may be difficult to remove.
3009 This program displays advertisements based on Web search habits.
3010 This program delivers advertisements and tracks activity.
3011 This program displays advertisements and may be delivered through unsolicited installation.
3012 This program displays advertisements and runs without a user interface.
3013 This program displays advertisements inside other software.
3014 This program displays deceptive product messages.
3015 This program displays advertisements and may install other software.
3016 This program is used to bypass security policies.
3017 This program changes various Web browser settings without adequate consent.
3018 This program changes the default home page.
3019 This program changes the default search engine and the homepage.
3020 This program changes the default search engine, the homepage, and other browser settings.
3021 This program redirects access to Web pages.
3022 This program changes browser settings and displays advertisements.
3023 This program modifies Web page content.
3024 This program changes Web page links.
3025 This program adds links to adult content.
3026 This program adds a browser toolbar and may be delivered through unsolicited installation.
3027 This program adds a sidebar to the browser that displays advertisements.
3028 This program displays adult content.
3029 This program changes the default seach engine.
3030 This program changes browser settings and is often bundled with other programs.
3035 This program dials toll numbers to create telephone charges.
3036 This program dials toll numbers to gain access to adult content.
3037 This program dials toll numbers and delivers advertisements for adult content.
3038 This program can be used to perform a denial of service attack.
3039 This program overwhelms a user's inbox with email messages.
3041 This program takes advantage of a security vulnerability.
3042 This program allows users to download or share files.
3046 This program is designed to amuse or scare the user.
3047 This program monitors user activity, such as keystrokes typed.
3049 This program is used to create viruses, worms or other malware.
3050 This program monitors user information.
3052 This program is dangerous and captures user passwords.
3054 This program is often installed a bundle with other programs.
3055 This program may have been installed without adequate user consent.
3056 This program runs automatically and without adequate user notification.
3058 This program may update without adequate user consent and may be delivered through unsolicited installation.
3059 This program updates automatically without adequate user consent.
3061 This program does not adequately disclose potentially unwanted behavior.
3062 This program is often distributed as a component of other potentially unwanted software.
3063 This program has potentially unwanted behavior.
3064 This program disables other software as part of its installation.
3066 This program provides remote access to the computer it is installed on.
3069 This program changes various computer settings without adequate consent.
3070 This program installs other potentially unwanted software.
3072 This program may install other potentially unwanted software.
3073 This program installs adware.
3074 This program installs spyware.
3075 This program installs browser modifiers.
3076 This program installs software that displays adult content.
3077 This program sends unauthorized e-mail.
3078 This program collects user information.
3079 This program tracks activity and delivers advertisments.
3080 This program tracks activity and may disable other programs.
3081 This program tracks activity and is often bundled with other programs.
3082 This program tracks activity and may be difficult to remove.
3083 This program tracks activity and all Web page content, including secure pages.
3084 This program connects to the Internet in the background.
3087 This program can be used for malicious purposes if unauthorized.
3089 This program is dangerous and exploits the computer on which it is run.
3090 This program is dangerous, exploits the computer, and provides access to user files.
3091 This program is dangerous, exploits the computer, and shares user information.
3092 This program is dangerous and downloads other programs.
3093 This program is dangerous and installs other programs.
3095 This program is dangerous and records user activity.
3096 This program silently informs a server when it has been installed.
3097 This program is dangerous and acts as a proxy server.
3100 This program is dangerous and self-propagates over a network connection.
3104 This program monitors user information, such as Web browsing habits.
3105 This program changes various computer settings.
3106 This program changes the system hosts file.
3108 This program monitors sensitive information, such as keystrokes typed.
3109 This program is dangerous and monitors user information.
3110 This program is dangerous and replicates by infecting other files.
3111 This program is dangerous and can hide programs or bypass security.
3112 This program is dangerous and executes commands from an attacker.
3113 A system change was detected. This generally occurs when software is installed.
4000 Permit this detected item only if you trust the program or the software publisher.
4001 This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you're not sure whether to permit it, review the alert details or check if you recognize and trust the publisher of the software.
4002 Review the alert details to see why the software was detected. If you do not like how the software operates or if you do not recognize and trust the publisher, consider blocking or removing the software.
4004 Remove this software immediately.
4005 Remove this software immediately.
5000 Not Yet Classified
5001 Low
5002 Medium
5004 High
5005 Severe
6000 A system change was detected. This generally occurs when software is installed.
6001 Programs that are typically benign unless they are installed on your computer without your knowledge.
6002 Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, for example, by collecting personal information or changing settings.
6004 Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, by collecting information or changing settings, typically without your knowledge or consent.
6005 Widespread or exceptionally harmful programs, similar to viruses or worms, that negatively affect your privacy and your computer's security, and that damage your computer.