Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
PWS:Win32/Lineage.CC is a password stealing trojan that targets popular online games. It may drop and load a payload component that performs the data theft, and a rootkit component that hides the trojan and its associated components from the affected user.
Alert level: severe
Updated on Apr 11, 2011
Cutwail is a trojan which is able to download and executes arbitrary files. Downloaded files may be executed from disk or injected directly into another process. Whilst the functionality of the files that are downloaded may change, Cutwail usually downloads a trojan which is able to send spam. Cutwail also employs rootkit and other defensive techniques to avoid detection and removal.
 
VirTool:WinNT/Cutwail.K is a device driver component (rootkit) used by Cutwail malware family.
It contains functionality to modify the system's winlogon.exe.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or detection by anti-virus scanners. They commonly employ a combination of methods including encryption, compression, anti-debugging and anti-emulation techniques.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or detection by anti-virus scanners. They commonly employ a combination of methods including encryption, compression, anti-debugging and anti-emulation techniques.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or detection by anti-virus scanners. They commonly employ a combination of methods including encryption, compression, anti-debugging and anti-emulation techniques.
Alert level: severe
Updated on Aug 08, 2019

This detection is for suboptimal configurations that may prevent Microsoft Defender Antivirus from functioning properly.

If you see this detection, a suboptimal configuration was detected, and Microsoft Defender Antivirus will auto-heal by automatically resetting to more secure configurations.

Alert level: severe
Updated on Mar 29, 2012
VirTool:Win32/CeeInject.CG is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Mar 29, 2012
VirTool:Win32/CeeInject.gen!GQ is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Mar 29, 2012
VirTool:Win32/VBInject.gen!HC is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Mar 29, 2012
VirTool:Win32/VBInject.gen!HH is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Mar 29, 2012
VirTool:Win32/VBInject.VQ is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Mar 29, 2012
VirTool:Win32/VBInject.RM is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Jun 21, 2011
VirTool:Win32/Vbcrypt.BZ is a detection for executables written in Visual Basic (VB), that embed other malicious components by encrypting them inside their code. Their main objective is to hide the embedded malicious components from users and avoid detection and removal by antivirus solutions.
Alert level: severe
Updated on Jun 21, 2011
VirTool:Win32/Vbcrypt.CG is a detection for executables written in Visual Basic (VB), that embed other malicious components by encrypting them inside their code. Their main objective is to hide the embedded malicious components from users and avoid detection and removal by antivirus solutions.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Tibs.E.dll is a user-mode rootkit that may be dropped by a variant of Win32/Tibs or by variants of other malicious software. VirTool:Win32/Tibs.E.dll is injected into certain types of processes in order to hide certain malicious software on the computer.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or  detection by anti-virus scanners. They commonly employ a combination of methods including encryption, compression, anti-debugging and anti-emulation techniques.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or  detection by anti-virus scanners. They commonly employ a combination of methods including encryption, compression, anti-debugging and anti-emulation techniques.
Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or  detection by anti-virus scanners. They commonly employ a combination of methods including encryption, compression, anti-debugging and anti-emulation techniques.
Alert level: severe
Updated on Apr 27, 2011
VirTool:Win32/VBInject.OU is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Apr 27, 2011
VirTool:Win32/VBInject.gen!GB is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe