Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Mar 14, 2013

Backdoor:Win32/IRCbot.gen!AA is a worm that allows backdoor access and control of your computer by a remote server.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0840.AA is the detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Alert level: severe
Updated on Oct 21, 2005
TrojanProxy:Win32/Mitglieder.AA is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan injects its code into the Windows Explorer process explorer.exe. The Trojan monitors a randomly chosen TCP port for commands from attackers. Attackers can use the computer as a Web and SMTP proxy. 
Alert level: severe
Updated on Sep 02, 2013

Trojan:Win64/Sirefef.AA is a user-mode component of the Sirefef malware family and runs on the 64-bit version of Windows. Sirefef is a multi-component family that performs different functions, such as downloading updates and additional Sirefef components, hiding existing Sirefef components or performing a payload. This malware moderates your Internet experience by changing search results, and generating pay-per-click advertising revenue for the malware controllers.

For more information about the Sirefef family, see the description for Win32/Sirefef elsewhere in the encyclopedia.

Alert level: severe
Updated on Mar 03, 2005
Win32/Bagle.AA@mm is a mass-mailing worm that targets computers running certain versions of Microsoft Windows. The worm sends itself as an attachment to e-mail addresses that it finds in files on the infected computer. It also spreads through file-sharing networks. The worm opens a backdoor and monitors a TCP port for instructions from remote attackers.
Alert level: severe
Updated on Apr 12, 2012

Trojan:Win32/Tracur.AA is a trojan that silently downloads and installs other programs without consent. It could install additional malware or malware components to an affected computer.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.AA is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Vobfus.AA is a worm - a self-propagating program that can spread itself from one computer to another. Worms may spread themselves via a variety of different channels in order to compromise new computers. Commonly, worms may spread directly by copying themselves to removable or network drives, or by attempting to exploit particular vulnerabilities on targeted computers. Worms also often attempt to spread via platforms that require user interaction in order to run. They may send themselves as an attachment to an email or an instant message, or send a link to a copy of themselves in the body of a message. In these cases the message needs to be convincing enough to encourage the victim to click on the link or attachment and run or download a copy of the worm.
Alert level: severe
Updated on May 06, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on Apr 11, 2011
Worm:AutoIt/Autorun.AA is a worm - a self-propagating program that can spread itself from one computer to another. Worms may spread themselves via a variety of different channels in order to compromise new computers. Variants of Worm:Win32/Autorun usually spread using methods that include, but may not be limited to, copying themselves to removable or network drives, and placing an autorun.inf file in the root directory of each affected drive in an attempt to ensure that the worm is run when the removable drive is attached, or the network drive is visited from a remote system supporting the Autorun feature.
Alert level: severe
Updated on Nov 22, 2010
This detection covers some variants of malware that is also detected as Backdoor:Qakbot.gen!A. See that description for more information.
Alert level: severe
Updated on Aug 27, 2012
Backdoor:Win32/Kelihos.AA is a trojan that allows unauthorized access and control of an affected computer.
Alert level: severe
Updated on Mar 23, 2023
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/VBInject.AA is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/VBInject.gen!AA is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Jan 08, 2005
Backdoor:Win32/Gaobot.AA is a backdoor Trojan that installs a service.
Alert level: severe
Updated on Feb 07, 2005
Win32/Mydoom.AA@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also installs a .dll file that acts as a backdoor.
Alert level: severe
Updated on Dec 07, 2011

Trojan:Win32/Sefnit.AA is a trojan that may monitor Internet Explorer or Mozilla Firefox to hijack the search results for various search engines.

Alert level: severe
Updated on Jan 07, 2005
Backdoor:Win32/Berbew.AA is a backdoor Trojan that downloads to a computer using another downloader Trojan that is sent in e-mail. Backdoor:Win32/Berbew.AA retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on May 03, 2005
Backdoor:Win32/Hackdef.AA is a backdoor Trojan that is distributed in various ways to computers running certain versions of Microsoft Windows. This Trojan is a user-mode rootkit. It creates, alters, and hides Windows system resources and can hide proxy services and backdoor functionality. It can also conceal use of TCP and UDP ports for receiving commands from attackers.
Alert level: severe