Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
VirTool:Win32/VBInject.gen!AB is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:Java/OpenConnection.AB is a trojan Java applet that could allow the downloading and execution of arbitrary malicious files.
Alert level: severe
Updated on Apr 30, 2008
This dynamic-link library (DLL) file is dropped by variants of Backdoor:Win32/Berbew. See the parent variant list for more information.
Alert level: severe
Updated on Oct 14, 2015

Windows Defender detects and removes this threat.

This threat is part of the Win32/Banload family. Trojans in this family can download other malware onto your PC, including Win32/Banker and Win32/Bancos.

They can also steal your banking user names and passwords and send them to a remote attacker.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Pushbot.AB is a worm that may spread via MSN Messenger and/or AIM. The worm also contains backdoor functionality that allows unauthorized access to an affected machine. This worm does not spread automatically upon installation, but must be ordered to spread by a remote attacker.
Alert level: severe
Updated on Apr 11, 2011
Virus:Win32/Prolaco.AB is a detection for files infected by variants of Worm:Win32/Prolaco.
Alert level: severe
Updated on Jun 09, 2011

Virus:Win32/Expiro.AB is the detection for a virus that infects EXE files in all drives and collects user credentials from an infected computer. It also allows backdoor access and control to the infected computer, and lowers Internet Explorer settings.

Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:ASX/Wimad is a detection for malicious Windows media files that are used in order to encourage users to download and execute arbitrary files on an affected machine. When opened with Windows Media Player, these malicious files open a particular URL in a web browser. 
Alert level: severe
Updated on Jul 01, 2005
Win32/Randex.AB.worm is a network worm that targets computers running certain versions of Microsoft Windows. The worm generates and scans IP addresses randomly to attempt to spread to writeable network shares that have weak passwords. The worm also has backdoor capabilities that allow attackers to control an infected computer through an IRC channel.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Nuqel.AB is a worm - a self-propagating program that can spread itself from one computer to another. Worms may spread themselves via a variety of different channels in order to compromise new machines. Commonly, worms may spread directly by copying themselves to removable or network drives, or by attempting to exploit particular vulnerabilities on targeted machines. Worms also often attempt to spread via platforms that require user interaction in order to run. They may send themselves as an attachment to an email or an instant message, or send a link to a copy of themselves in the body of a message. In these cases the message needs to be convincing enough to encourage the victim to click on the link or attachment and run or download a copy of the worm.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Ldpinch.AB is a member of Win32/Ldpinch - a family of trojans that steals sensitive information from affected machines and sends it to a remote attacker. In particular, Ldpinch variants target passwords for a comprehensive selection of FTP, chat and e-mail clients, as well as those stored by browsers and in protected storage.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Koceg.AB is the detection for a trojan backdoor that steals FTP credentials and may be instructed to download and install other malicious files from remote Web sites.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Brontok.AB@mm is a worm that spreads via e-mail and removable drives. The worm spreads by sending a copy of itself as an e-mail attachment to e-mail addresses that it gathers from files on the infected computer. It can also copy itself to USB and pen drives. Win32/Brontok can disable antivirus and security software, immediately terminate certain applications, and cause Windows to restart immediately when certain applications run. The worm may also conduct Denial of Service (DoS) attacks against certain web sites.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Hamweq.AB is a worm that spreads via removable drives, such as USB memory sticks. It contains an IRC-based backdoor, which may be used by a remote attacker to order the affected machine to participate in Distributed Denial of Service attacks, or to download and execute arbitrary files.
Alert level: severe
Updated on Feb 14, 2024
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or detection by anti-virus scanners. They commonly employ a combination of methods including encryption, compression, anti-debugging and anti-emulation techniques.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Sohanad.AB is a member of Win32/Sohanad - a family of worms that may spread via removable or network drives and particular messenger applications. It may also modify a number of system settings to facilitate its actions on an affected computer, and contact a remote host.
Alert level: severe
Updated on Jun 08, 2011

Trojan:Win32/Alureon.gen!AB is the generic detection for a member of the Win32/Alureon family. It drops another malware, tries to delete the Hosts file, and tries to create a virtual file system (VFS). It may also connect to certain servers.

Alert level: severe
Updated on Jun 29, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on May 23, 2011
VirTool:JS/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or detection by anti-virus scanners. They commonly employ a variety of techniques such as encryption.
Alert level: severe