Skip to main content
Skip to main content
Microsoft Security Intelligence
553 entries found. Displaying page 28 of 28.
Updated on Nov 01, 2005
TrojanDownloader:Win32/Bagle.BS.dll is a DLL component of TrojanDropper:Win32/Bagle.BS. When the Trojan dropper runs, it drops its DLL component. Thereafter, each time Windows starts, the Trojan dropper injects the DLL into the explorer.exe process space and runs the injected code.
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Oct 23, 2007

This program was detected by definitions prior to 1.175.2037.0 as it violated the guidelines by which Microsoft identified unwanted software. Based on analysis using current guidelines, the program does not have unwanted behaviors.

Alert level: moderate
Updated on Feb 03, 2009
Worm:Win32/Autorun.FC is a worm that spreads via removable drives and attempts to download files from a remote Web address.
Alert level: severe
Updated on Apr 21, 2011
Trojan:Win32/Pirpi.gen!A is a generic detection for malware that attempts to download other malware from certain remote servers. This trojan is installed by other malware such as Trojan:Win32/Pirpi.A.
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Jun 04, 2007
Dialer:Win32/EGroup.G is an adult content dialer. The dialer runs in the background at Windows startup and may connect to premium-rate telephone numbers, resulting in charged connection fees to the owner of the infected computer. Only computers with a telephone modem connection are at risk of dial-up fees incurred by the dialer.
Alert level: high
Updated on Nov 29, 2004
TrojanDownloader:Java/OpenConnection.F is a malicious Java applet that downloads and runs other malicious files from a remote Web site. The downloader often works with Java/Classloader and Java/Bytverify, which exploit the vulnerability addressed in Microsoft Security Update MS03-011.
Alert level: severe
Updated on Jul 14, 2005
TrojanDownloader:Java/OpenConnection.L is a  Java applet that attempts to download and execute files from a malicious web site. It often works in conjunction with Java/Classloader and Java/Bytverify that exploit a vulnerability in the ByteCode verifier component of the Microsoft VM, as described and fixed in MS03-011.
Alert level: severe
Updated on Mar 31, 2008
This program was detected by definitions prior to 1.159.567.0 as it violated the guidelines by which Microsoft identified unwanted software. Based on analysis using current guidelines, the program does not have unwanted behaviors.
Alert level: moderate
Updated on Jan 13, 2011
Exploit:Java/CVE-2010-0840.AM is a detection for a malicious and encrypted Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Alert level: severe