Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.AA is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Vobfus.AA is a worm - a self-propagating program that can spread itself from one computer to another. Worms may spread themselves via a variety of different channels in order to compromise new computers. Commonly, worms may spread directly by copying themselves to removable or network drives, or by attempting to exploit particular vulnerabilities on targeted computers. Worms also often attempt to spread via platforms that require user interaction in order to run. They may send themselves as an attachment to an email or an instant message, or send a link to a copy of themselves in the body of a message. In these cases the message needs to be convincing enough to encourage the victim to click on the link or attachment and run or download a copy of the worm.
Alert level: severe
Updated on Apr 12, 2012

Trojan:Win32/Tracur.AA is a trojan that silently downloads and installs other programs without consent. It could install additional malware or malware components to an affected computer.

Alert level: severe
Updated on Jan 07, 2005
Backdoor:Win32/Berbew.AA is a backdoor Trojan that downloads to a computer using another downloader Trojan that is sent in e-mail. Backdoor:Win32/Berbew.AA retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on Apr 11, 2011
Virus:Win32/Prolaco.AA is a detection for files infected by variants of Worm:Win32/Prolaco.
Alert level: severe
Updated on Oct 21, 2005
TrojanProxy:Win32/Mitglieder.AA is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan injects its code into the Windows Explorer process explorer.exe. The Trojan monitors a randomly chosen TCP port for commands from attackers. Attackers can use the computer as a Web and SMTP proxy. 
Alert level: severe
Updated on Sep 02, 2013

Trojan:Win64/Sirefef.AA is a user-mode component of the Sirefef malware family and runs on the 64-bit version of Windows. Sirefef is a multi-component family that performs different functions, such as downloading updates and additional Sirefef components, hiding existing Sirefef components or performing a payload. This malware moderates your Internet experience by changing search results, and generating pay-per-click advertising revenue for the malware controllers.

For more information about the Sirefef family, see the description for Win32/Sirefef elsewhere in the encyclopedia.

Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/VBInject.gen!AA is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Slenping.AA is a worm that spreads via removable drives and messaging software, and contains backdoor functionality.
Alert level: severe
Updated on May 23, 2011
VirTool:JS/Obfuscator are detections for programs that have had their purpose obfuscated to hinder analysis or detection by anti-virus scanners. They commonly employ a variety of techniques such as encryption.
Alert level: severe
Updated on Jun 09, 2011

Virus:Win32/Expiro.AA is the detection for a virus that infects EXE files in all drives and collects user credentials from an infected computer. It also allows backdoor access and control to the infected computer, and lowers Internet Explorer settings.

Alert level: severe
Updated on Mar 23, 2023
Alert level: severe
Updated on May 03, 2005
Backdoor:Win32/Hackdef.AA is a backdoor Trojan that is distributed in various ways to computers running certain versions of Microsoft Windows. This Trojan is a user-mode rootkit. It creates, alters, and hides Windows system resources and can hide proxy services and backdoor functionality. It can also conceal use of TCP and UDP ports for receiving commands from attackers.
Alert level: severe
Updated on Jan 08, 2005
Backdoor:Win32/Gaobot.AA is a backdoor Trojan that installs a service.
Alert level: severe
Updated on Dec 07, 2011

Trojan:Win32/Sefnit.AA is a trojan that may monitor Internet Explorer or Mozilla Firefox to hijack the search results for various search engines.

Alert level: severe
Updated on Feb 07, 2005
Win32/Mydoom.AA@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also installs a .dll file that acts as a backdoor.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0840.AA is the detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Alert level: severe
Updated on Mar 14, 2013

Backdoor:Win32/IRCbot.gen!AA is a worm that allows backdoor access and control of your computer by a remote server.

Alert level: severe
Updated on Apr 11, 2011
VirTool:Win32/VBInject.AA is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level: severe
Updated on Aug 27, 2012
Backdoor:Win32/Kelihos.AA is a trojan that allows unauthorized access and control of an affected computer.
Alert level: severe