Win32/Clikug
Windows Defender detects and removes this threat.
This threat uses your PC for click fraud. It can run in the background whenever your PC is turned on.
We have seen this threat using as much as 1 GB of bandwidth per hour - this can severely impact the speed of your Internet connection as well as lead to excess data usage charges from your Internet service provider.
Clikug is also known as Giga Clicks, Hyper Browser, and Idle Crawler. It is usually installed by third-party software installation programs.
Win32/Mdmbot
This family of threats can allow remote malicious hackers to access your PC, download other malware, and change your Internet Explorer start page and security settings.
Win32/Hikiti
Microsoft security software detects and removes this family of threats.
These threats connect to a remote server and wait for instructions from a malicious hacker. This can include instructions to download other malware, or collect information about your PC.
They can be downloaded by other malware, including Win32/Mdmbot, Win32/Moudoor, Win32/Plugx, Win32/Sensode, and Win32/Derusbi. They can also be installed when you visit a hacked or malicious website.
Win32/Tofsee
Microsoft security software detects and removes this family of threats.
These backdoor trojans can use your PC to send spam emails, conduct DDoS attacks and mine for Bitcoins. They can also monitor what you do on your PC and send the information to a malicious hacker.
Win32/Zoxpng
Microsoft security software detects and removes this family of threats.
This family of threats can give a malicious hacker access and control of your PC.
They can be installed on your PC by other malware.
Win32/Winnti
Winnti is a family of multi-component malware that give threat actors persistent access and control over infected devices through a backdoor. It has known associations with activity groups involved in cyberespionage.
Win32/Drixed
Microsoft security software detects and removes this family of threats.
Threats in this malware family can steal your sensitive information, such as your email and banking credentials.
They can be installed by macro malware downloader families such as Donoff, Adnel, and Bartallex
Win32/Bunitu
Microsoft security software detects and removes this family of threats.
These threats can give a malicious hacker access to your PC as a proxy, which means they can hide their other malicious activities.
They can be installed on your PC if you visit a compromised or hacked website, as a result of an exploit kit such as Exploit:JS/Angler.
Win32/Jinupd
Windows Defender detects and removes this threat.
This threat tries to steal credit card information that is stored on PCs that are used at point-of-sale.
This threat might have got on your PC from a drive-by exploit or as a result of other malware downloading it.
Win32/Varpes
Windows Defender detects and removes this threat.
A trojan is a type of malware that can’t spread on its own. It relies on you to run them on your PC by mistake, or visit a hacked or malicious webpage.
They can steal your personal information, download more malware, or give a malicious hacker access to your PC.
Win32/Copali
Microsoft security software detects and removes this family of threats.
This family of worms can download other malware, including PWS:Win32/Zbot.
They spread through infected network and removable drives.
Win32/Unskal
Win32/Dexter
Microsoft security software detects and removes this family of threats.
This malware family can steal credit card information from point-of-sale systems.
It can be installed by a malicious hacker using brute force to guess your password, or through a software vulnerability.
Win32/Kadena
Windows Defender detects and removes this threat.
This is a generic detection for malware that is part of the Upatre infection chain. It includes threats from the following families: