Skip to main content
Skip to main content
1504 entries found. Displaying page 17 of 76.
Updated on May 01, 2008
TrojanClicker:Win32/Zirit.X is a generic detection for several variants of a trojan DLL which repeatedly visits web pages it is instructed to visit by a remote server. It may also result in the display of pop-ups.
Alert level: severe
Updated on May 04, 2008
Trojan:Win32/Wintrim.gen!A is a generic detection for variants of the Win32/Wintrim trojan family.
Alert level: severe
Updated on May 16, 2008
TrojanSpy:Win32/VBStat.AD is dropped as a component of Worm:Win32/RJump.F. Its purpose is to execute Win32/RJump.F at each Windows start.
Alert level: severe
Updated on May 30, 2008
Trojan:Win32/BHO.LI is a trojan that runs as a Browser Helper Object (BHO) in Internet Explorer under the name "CableRouting".
Alert level: severe
Updated on Jun 06, 2008
Trojan:Win32/Pasich.A is the detection for the DLL file component of a multi-component trojan downloader. Its main function is to download and execute arbitrary files.
Alert level: severe
Updated on Jun 06, 2008
Trojan:Win32/WinSpywareProtect is a program that may falsely claim that the user's system is infected and encourages the user to buy a promoted product for cleaning the alleged malware from the computer.
Alert level: high
Updated on Jun 09, 2008
TrojanClicker:Win32/Zirit.Y is a generic detection for several variants of a trojan EXE file, which repeatedly visits a specific website, presumably to collect per-click payments. It may also display pop-ups.
Alert level: severe
Updated on May 08, 2009
TrojanDropper:Win32/Vtimrun.A is a trojan that drops and installs a trojan downloader onto the local computer. The dropped trojan is identified as TrojanDownloader:Win32/Vtimrun.A.
Alert level: severe
Updated on May 13, 2009
Trojan:Win32/Zbot.CJ is a password stealing trojan with remote access functionality. This trojan may inject code into running processes and download files from a predefined Web site. In the wild, this trojan has been observed distributed in spam e-mail messages as an attachment named "World_CONFR.zip".
Alert level: severe
Updated on Jul 06, 2009
Backdoor:PHP/Shell.A is a Hypertext Preprocessor (.PHP) script that is used to compromise a server running a vulnerable PHP application. Once compromised, information is returned to a remote attacker via the script execution request.
Alert level: severe
Updated on Nov 04, 2009
Trojan:JS/Cardst is detection for a trojan JavaScript within an HTML file attached to an e-mail message. The HTML attachment is used for phishing purposes and contains a form for entering credit card information with a submit button that sends the collected data to a specific server.
Alert level: severe
Updated on Nov 16, 2009
Trojan:Win32/Oficla.G is a trojan that installs and runs Trojan:Win32/Oficla.E. Trojan:Win32/Oficla.E may download a rogue security program identified as TrojanDownloader:Win32/FakeScanti.
Alert level: severe
Updated on Mar 12, 2010
BAT/ExitE is detection for a trojan batch script that logs a user out of a Windows session when executed.
Alert level: severe
Updated on May 23, 2011

VirTool:WinNT/Popureb.A is a component of Win32/Popureb. It uses a low level disk driver hook to prevent a malicious Master Boot Record (MBR) and other malicious data stored as disk sectors from being changed.

Alert level: severe
Updated on Jun 22, 2011

Trojan:AndroidOS/Plankton.A is a trojan that affects devices running the Android operating system, such as mobile phones. It may arrive as part of repackaged Android applications and downloaded from third-party Android application markets. Once the application is installed, it collects information about the mobile device and performs actions based on instructions from a remote attacker.

Alert level: severe
Updated on Mar 07, 2012

Trojan:WinNT/Mediyes.B is a rootkit driver that is installed by the Mediyes malware family, a multi-component trojan that steals account information for online payment systems.

Alert level: severe
Updated on Mar 13, 2012

Trojan:JS/Iframe.AQ is a malicious JavaScript file that is embedded, via an IFrame, into malicious or compromised webpages, usually via SQL injection or through Blackhat search engine optimization (SEO) poisoning. The purpose of the file is to redirect your browser to other sites that may download malware onto your computer.

To avoid detection, the IFrame may be only one pixel in size.

Alert level: severe
Updated on Mar 29, 2012

Exploit:JS/ShellCode.AS is a detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .HTML files.

Alert level: severe
Updated on Mar 29, 2012

Trojan:BAT/MineBicoin.A is a batch file that is used to launch a Bitcoin mining program that is dropped on your computer without your consent.

Alert level: severe
Updated on Apr 04, 2012

Windows Defender detects and removes this threat.

This family of threats are malicious JavaScript files that redirect web searches to pay-per-click advertising sites.

This threat might be installed on your PC from a Win32/Medfos variant.

Find out ways that malware can get on your PC.  

Alert level: severe