Skip to main content
Skip to main content
855 entries found. Displaying page 13 of 43.
Updated on Jul 23, 2007

This program was detected by definitions prior to 1.175.2424.0 as it violated the guidelines by which Microsoft identified unwanted software. Based on analysis using current guidelines, the program does not have unwanted behaviors.

Alert level: moderate
Updated on Jan 04, 2008
Worm:Win32/Perlovga.dr is a component of Worm:Win32/Perlovga - a multi-component worm that spreads via logical and removable drives. It also drops additional malware that contains backdoor functionality.
Alert level: severe
Updated on Feb 01, 2008
TrojanDownloader:Win32/Cbeplay.A is a trojan that may upload computer operating system details to a remote web site, download additional malware, and terminate debugging utilities. This trojan may have been distributed via  spam e-mail, either in a form of a password-protected zip attachment or a link to a malicious site where the trojan may be hosted.
Alert level: severe
Updated on Feb 04, 2008
Trojan:Win32/Bohmini.A is a backdoor trojan allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2008
Trojan:Win32/Nedsym.B is a trojan that distributes spam email messages. It also collects information about the affected computer, and sends it back to its command and control (C&C) server. The trojan also uses stealth techniques in order to hide its presence on an affected computer.
Alert level: severe
Updated on Apr 14, 2008
Backdoor:Win32/Allaple.D is a member of a multi-component malware family with a backdoor that performs activities such as key logging and sending system and password information to a remote server. This component downloads a number of executables used by the backdoor, determines the location of the server used by the backdoor’s controller, and launches other components of the backdoor when requested to do so.
Alert level: severe
Updated on Apr 14, 2008
Backdoor:Win32/Allaple.E is a backdoor that utilizes tools, or additional components downloaded by other Allaple variants, in order to perform activities such as key logging and sending system and password information to a remote server.
Alert level: severe
Updated on Apr 25, 2008
Worm:Win32/Autorun.BO is a worm that may drop a backdoor trojan (identified as Backdoor:Win32/Bifrose.gen!A) and connect with remote Web sites.
Alert level: severe
Updated on May 16, 2008
Backdoor:Win32/Hupigon.gen is a generic detection for a DLL component of Win32/Hupigon. This component logs keystrokes, captures screens and steals passwords and other sensitive data. Detection for this component may indicate that other files on the computer might be infected.
Alert level: severe
Updated on Sep 04, 2008
Backdoor:Win32/Hupigon.gen!F is a generic detection for variants of Win32/Hupigon, a family of backdoor trojans. Win32/Hupigon.gen!F is installed to run as a service and allows remote unauthorized access to an affected machine.
Alert level: severe
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AP is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe
Updated on Mar 28, 2005
Backdoor:Win32/Rbot.FU is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Jun 29, 2005
Backdoor:Win32/Haxdoor.CW is a backdoor Trojan that opens and listens on three random TCP ports for proxy and remote access purposes.
Alert level: severe
Updated on Jun 29, 2005
Backdoor:Win32/Haxdoor.CX is a backdoor Trojan that opens and listens on three random TCP ports for proxy and remote access purposes.
Alert level: severe
Updated on Oct 03, 2006
Backdoor:Win32/Haxdoor.CN is a rootkit-enabled backdoor trojan that gathers private user data and sends it to remote attackers. Collected data might include user names and passwords, credit card numbers, bank logon credentials, or other sensitive financial information. On NT-based systems, files and processes related to a Backdoor:Win32/Haxdoor.CN infection may be hidden by a kernel-mode rootkit component. The Backdoor:Win32/Haxdoor.CN trojan also disables firewall software and may perform other malicious actions, such as clearing CMOS settings, destroying disk data, or shutting down Windows unexpectedly. Certain components of the trojan may be detected by Microsoft as Backdoor:Win32/Haxdoor.CG.
Alert level: severe
Updated on Dec 20, 2004
Worm:Win32/Gaobot.U is a worm that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, MS03-026, or MS03-039. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe
Updated on Aug 10, 2005
Win32/Optixpro is a family of backdoor Trojans that targets several versions of Microsoft Windows. This Trojan is an enhanced version of Win32/Optix. The Trojan opens a backdoor that allows an attacker to control the computer remotely. It can be configured by attackers to perform a variety of malicious actions on the infected computer.
Alert level: severe
Updated on Jan 08, 2007
Backdoor:Win32/Haxdoor.CG is an NT-based driver component of Backdoor:Win32/Haxdoor.CN, a rootkit-enabled trojan that gathers private user data and sends it to remote attackers. Data collected by Backdoor:Win32/Haxdoor.CN might include user names and passwords, credit card numbers, bank logon credentials, or other sensitive financial information. On NT-based systems, files and processes related to a Backdoor:Win32/Haxdoor.CN infection may be hidden by a kernel-mode rootkit component. (This component is also detected as Backdoor:Win32/Haxdoor.CG). The Backdoor:Win32/Haxdoor.CN trojan also disables firewall software and may perform other malicious actions, such as clearing CMOS settings, destroying disk data, or shutting down Windows unexpectedly.
Alert level: severe
Updated on May 09, 2007
VirTool:WinNT/Haxdoor.F is a kernel-mode rootkit-enabled Trojan that allows remote control of the infected machine over the Internet. The Trojan contains instructions that allow it to disable certain antivirus programs and firewall applications, log keystrokes, allow remote connections, lower security settings or perform other unwanted actions. VirTool:WinNT/Haxdoor.F gathers user and system information and sends it to a third party.
Alert level: severe
Updated on May 09, 2007
VirTool:WinNT/Haxdoor.E is a kernel-mode rootkit-enabled Trojan that allows remote control of the infected machine over the Internet. The Trojan contains instructions that allow it to disable certain antivirus programs and firewall applications, log keystrokes, allow remote connections, lower security settings or perform other unwanted actions. VirTool:WinNT/Haxdoor.E gathers user and system information and sends it to a third party.
Alert level: severe