Trojan:Win32/Resmu.A!rootkit
Trojan:WinNT/Bubnix.J
TrojanDropper:Win32/Otlard.A
Trojan:WinNT/Kapa.A
TrojanDropper:Win32/Festi.C
Backdoor:WinNT/Festi.C
VirTool:WinNT/Rootkitdrv.HU
Trojan:WinNT/KillAV.E
VirTool:WinNT/Popureb.A
VirTool:WinNT/Popureb.A is a component of Win32/Popureb. It uses a low level disk driver hook to prevent a malicious Master Boot Record (MBR) and other malicious data stored as disk sectors from being changed.
Trojan:DOS/Alureon.C
Trojan:DOS/Alureon.C is the detection name for infected Master Boot Records (MBR) produced by certain variants of the Win32/Alureon rootkit family. The rootkit infects 32-bit and 64-bit systems.
HackTool:WinNT/Tcpz.C
HackTool:WinNT/Tcpz.C is a device driver that modifies the Windows TCP/IP stack device driver to change the concurrent TCP connection attempts limit.
Trojan:WinNT/Diskhide.A
Trojan:WinNT/Diskhide.A is a trojan installed as a kernel-mode driver that attempts to hide modifications to the Master Boot Record (MBR), detected as Trojan:DOS/Wador.A.
Trojan:Win64/Sirefef.W
Trojan:Win64/Sirefef.W is the 64-bit user-mode component of Win32/Sirefef - a multi-component family of malware that moderates your Internet experience by modifying search results, and generating pay-per-click advertising revenue for its controllers. The family consists of multiple parts that perform different functions, such as downloading updates and additional components, hiding existing components or performing a payload.
HackTool:Win64/Gendows
Windows Defender Antivirus detects and removes this threat.
This hacktool can be used to activate a pirated versions of Microsoft Windows and Microsoft Office.
We recommend you don't use hacktools as they can be associated with malware or unwanted software. We have seen malware distributed with these tools.
Backdoor:Win32/Rbot.EE
HackTool:Win32/Mimikatz
Mimikatz is a well-known hacktool used to extract Windows passwords in plain-text from memory, perform pass-the-hash attacks, inject code into remote processes, generate golden tickets, and more. This tool is used by red teams and real threat actors alike due to its powerful toolset and open-source nature allowing for easy modification. This tool is still regularly maintained and kept up to date with latest changes in Windows. Mimikatz is often delivered and executed without writing to disk (fileless) in an attempt to avoid detection.
Trojan:Win32/Alvabrig.A
VirTool:Win32/HiddenRun.B
Exploit:JS/ShellCode.AL
Exploit:JS/ShellCode.AL is a malicious JavaScript file that downloads and runs arbitrary files when certain vulnerabilities in the browser are exploited, usually by other malware.