Skip to main content
Skip to main content
855 entries found. Displaying page 14 of 43.
Updated on May 09, 2007
VirTool:WinNT/Haxdoor.C is a kernel-mode rootkit-enabled Trojan that allows remote control of the infected machine over the Internet. The Trojan contains instructions that allow it to disable certain antivirus programs and firewall applications, log keystrokes, allow remote connections, lower security settings or perform other unwanted actions. VirTool:WinNT/Haxdoor.C gathers user and system information and sends it to a third party.
Alert level: severe
Updated on Apr 17, 2008
Trojan:Win32/Pugeju.A is a trojan that may be used to send spam.
Alert level: severe
Updated on May 07, 2008
Adware:Win32/SideSearch is a Web Browser Helper Object (BHO) that inserts "sponsored links" to the left of retrieved search engine results in a search results page.
Alert level: moderate
Updated on Jun 06, 2008
Backdoor:Win32/IRCFlood is an IRC-controlled backdoor trojan that allows an attacker unauthorized access and control of an affected machine. In the wild, this trojan has been distributed via spammed email disguised as a greeting card. The email contains a link to the trojan, which may be downloaded with the file name 'postcard.exe'.
Alert level: severe
Updated on Jul 14, 2008
Backdoor:Win32/Rumsoot.gen!A is a trojan that may download files from a remote Web site.
Alert level: severe
Updated on Jul 25, 2008
Backdoor:Win32/Afcore.CE is a backdoor trojan that connects to a remote server to retrieve commands from an attacker.
Alert level: severe
Updated on Dec 16, 2008
Trojan:Win32/Delicium.A is a trojan component of Virus:Win32/Delicium.A, whose main purpose is to infect files with the EXE extension. It is also a destructive trojan, deleting files with certain extensions, including MP3, XLS, PDF, and MPG.
Alert level: severe
Updated on Jun 04, 2009
Tool:Win32/CrackDownloader is a program designed to download 'cracks' and 'serials' to bypass software protection in an effort to legitimize software applications. Programs downloaded by Win32/CrackDownloader may contain other malware.
Alert level: moderate
Updated on Sep 05, 2007
Backdoor:Win32/Nuwar.B is a backdoor Trojan that allows unauthorized access to an infected computer. The Trojan receives commands indirectly from a remote attacker via its connection to a malicious peer-to-peer network. This Trojan also contains advanced stealth functionality that allows it to hide particular files, registry entries and registry values.
Alert level: severe
Updated on Oct 24, 2007
Backdoor:Win32/Bifrose.ACI.dr is a Trojan dropper for the Trojan backdoor Win32/Bifrose.ACI. Bifrose.ACI allows an attacker access to the compromised computer, and injects its processes into the Windows shell and the Internet Web browser Internet Explorer.
Alert level: severe
Updated on Apr 14, 2008
Windows Defender Antivirus detects and removes this threat.
 
This threat is a generic detection for malicious files that are hidden to protect them from detection or analysis.
Alert level: severe
Updated on Jul 18, 2008
Backdoor:Win32/Farfli.B.sys is the detection for a part of a multi-component malware. It is dropped in a system by Backdoor:Win32/Farfli.B, along with several other files.
Alert level: severe
Updated on Oct 06, 2008
Backdoor:Win32/VB.CCK is a backdoor trojan that allows unauthorized access to an affected machine. This trojan could be instructed by a remote attacker to download and execute arbitrary files.
Alert level: severe
Updated on Jan 17, 2009
TrojanDownloader:Win32/Chansact.A is a trojan that runs as a service, and may contact a remote web server to download additional malware.
Alert level: severe
Updated on Mar 06, 2009
VirTool:Win32/VBInject.gen!U is a generic detection of obfuscated Visual Basic compiled malicious code. The malicious code or file is usually encrypted and/or compressed, and is decrypted and decoded before it is injected into a process or dropped and executed.
Alert level: severe
Updated on Apr 09, 2009
Backdoor:WinNT/Rustock.H is a component of Win32/Rustock - a multi-component family of rootkit-enabled backdoor trojans, which were historically developed to aid in the distribution of 'spam' e-mail. First discovered sometime in early 2006, Rustock has evolved to become a prevalent and pervasive threat. Recent variants appear to be associated with the incidence of rogue security programs.
Alert level: severe
Updated on Sep 11, 2009
Exploit:Win32/MS06040.gen is a generic detection for malicious software that attempts to exploit a vulnerability in Windows Server Service that can allow the execution of arbitrary code. The vulnerability is referenced in Microsoft Security Bulletin MS06-040 and Microsoft Knowledge Base article KB921883.
Alert level: severe
Updated on Dec 21, 2004
Backdoor:Win32/Gaobot.AG is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe
Updated on Dec 23, 2004
Backdoor:Win32/Rbot.CB is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Mar 21, 2005
Backdoor:Win32/Rbot is a family of backdoor Trojans that allows attackers to control infected computers. After a computer is infected, the Trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the Trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, and spreading through backdoor ports opened by other families of malicious software. The Trojan can also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Alert level: severe