PWS:Win32/Simda.A
Win64/Simda
Windows Defender detects and removes this threat.
See the Win32/Simda family description for more information.
WinNT/Simda
Windows Defender detects and removes this threat.
See the Win32/Simda family description for more information.
Win32/Simda
Windows Defender detects and removes this threat.
This family of password-stealing trojans can give a malicious hacker backdoor access and control to your PC. They can then steal your passwords and gather information about your PC.
MSIL/Simda
Windows Defender detects and removes this threat.
This threat can give a malicious hacker backdoor access and control to your PC. They can then steal your passwords and gather information about your PC.
See the Win32/Simda family description for more information.
PWS:Win32/Simda.AF
PWS:Win32/Simda.AF is a password-stealing trojan that may also allow backdoor access and control of your computer. Its main purpose is to steal passwords and system information from your computer.
PWS:Win32/Simda.L
Backdoor:Win32/Simda.E
Backdoor:Win32/Simda.F
Windows Defender detects and removes this threat.
This threat can give a malicious hacker backdoor access and control to your PC. They can then steal your passwords and gather information about your PC.
Trojan:Win32/Simda.R
Trojan:Win32/Simda.R is a component of Backdoor:Win32/Simda.A that is used to bypass the user account control (UAC) dialog in order to gain administrator privileges on the affected computer.
Trojan:Win64/Simda.A
Trojan:Win64/Simda.A is a 64-bit component of Backdoor:Win32/Simda.A. This component is responsible for elevating privileges in a 64-bit environment. It allows the main backdoor code to perform file system operations that require elevated permissions without displaying a security warning via user account control (UAC).
Trojan:WinNT/Simda.gen!A
Trojan:WinNT/Simda.gen!A is a kernel-mode driver component of Backdoor:Win32/Simda.A - a multi-component malware family. This component is responsible for hiding the backdoor's other components in the affected computer, as well as for manipulating the user's Internet traffic.