Backdoor:ASP/Aspy.A
Backdoor:ASP/Aspy.A is a backdoor trojan, written in ASP.Net, that allows unauthorized remote access and control of an affected computer or server.
Trojan:Win32/Gitwen.A
Worm:Win32/Slenping.AE
Backdoor:Win32/Bifrose.HM
Trojan:Win32/Wisp.gen!A
Trojan:Win32/Bamital.N
Trojan:Win32/Bamital.N is the detection for malware that intercepts web browser traffic and redirects search engine results. It also redirects access to certain websites to the local host.
Trojan:WinNT/Bancos.G
Trojan:WinNT/Bancos.G is the detection for a malware driver dropped by members of the Win32/Bancos family. This malware acts as a malicious component that attempts to delete several files related to security from the affected computer.
TrojanDownloader:MacOS_X/Revir.A
TrojanDownloader:MacOS_X/Revir.A is a trojan that downloads other malware onto your computer, such as Backdoor:MacOS_X/Imuler.A (a backdoor trojan that allows a remote attacker to access and control your computer).
It affects computers using the Mac OS X operating system.
The trojan may appear as a legitimate PDF attachment or link in an email. When you open the attachment or click the link, the trojan will run.
TrojanDownloader:Win32/Jadtre.B
Windows Defender detects and removes this threat.
This trojan can install other malware or unwanted software onto your PC.
Exploit:MacOS_X/MS09-027.A
Exploit:MacOS_X/MS09-027.A is a malicious Microsoft Word document that attempts to exploit a known vulnerability in Microsoft Office for Mac. The vulnerability was resolved with the release of Microsoft Security Bulletin MS09-027.
Exploit:MacOS_X/MS09-027.A drops other malware into your computer.
Backdoor:Win32/Zegost.X
Backdoor:Win32/Zegost.X is the DLL component of the Zegost malware family. It is usually installed in your computer by other variants of Zegost, such as Backdoor:Win32/Zegost.AD.
TrojanDownloader:Win32/Beebone.AY
TrojanDownloader:Win32/Beebone.AY is is a trojan that poses as a fake Adobe Flash update. It is reported to spread through links in Skype. It downloads files from a certain server.
Trojan:BAT/Bancos.B
Trojan:BAT/Bancos.B is a trojan that changes your computer's security settings. It is a component used by malware from the Win32/Bancos trojan family.
Win32/Gamker
Windows Defender detects and removes this threat.
This family of trojans aims to steal financial information, SAP information, BitCoin wallets, and other sensitive information from an infected PC.It can also let a hacker to do other malicious actions on your PC and network.
TrojanDownloader:Win32/Vistfla.A
Windows Defender detects and removes this threat.
This threat can perform a number of actions of a malicious hacker's choice on your PC.
Trojan:Win32/Chroject.B
Windows Defender detects and removes this threat.
This threat can perform a number of actions of a malicious hacker's choice on your PC.
See the Win32/Chroject family description for more information.
Win32/Chroject
Windows Defender detects and removes this threat.
This threat uses your PC to perform click fraud. It runs in the background and uses a significant amount of your PC's power and network bandwidth. This can severely impact the performance of your PC, the speed of your Internet connection, and may lead to excess data usage charges from your Internet service provider.
Ransom:Win32/DMALocker.A
Microsoft security software detects and removes this threat.
This ransomware can stop you from using your PC or accessing your data. It might ask you to pay money to a malicious hacker.
Ransom:Win32/Bucbi.A
Windows Defender detects and removes this threat.
This ransomware can be downloaded by other malware such as TrojanDownloader:Win32/Brucryp, or can be installed by a remote user after a successful brute force attack with an RDP Brute tool.
It can stop you from using your PC or accessing your data. It might ask you to pay money to a malicious hacker.
Our ransomware page has more information on this type of threat.
PUA:Win32/MicroNames
This application was stopped from running on your network because it has a poor reputation. This application can affect the quality of your computing experience. We have seen this leading to the following potentially unwanted behaviors on PCs:
- Adds files that run at startup
These applications are most commonly software bundlers or installers for applications such as toolbars, adware, or system optimizers.
If you were trying to install an application, you might have downloaded it from a source other than the official product's website.
We usually see this application installed on PCs in the following countries. This list is sorted according to prevalence:
- Korea
- United States
- Japan
- Canada
- Australia
This detection is part of our extended Potentially Unwanted Application protection feature.