VirTool:WinNT/Divapad.A
Trojan:WinNT/Bubnix.D
Trojan:Win32/Cryptrun.B!sys
Trojan:WinNT/Omexo.D
HackTool:WinNT/Tcpz.C
HackTool:WinNT/Tcpz.C is a device driver that modifies the Windows TCP/IP stack device driver to change the concurrent TCP connection attempts limit.
Trojan:Win64/Sirefef.W
Trojan:Win64/Sirefef.W is the 64-bit user-mode component of Win32/Sirefef - a multi-component family of malware that moderates your Internet experience by modifying search results, and generating pay-per-click advertising revenue for its controllers. The family consists of multiple parts that perform different functions, such as downloading updates and additional components, hiding existing components or performing a payload.
Worm:Win32/Stuxnet.B
Trojan:WinNT/Tibs.gen!A
Backdoor:WinNT/Syzor.A
Virus:Win32/Alureon.H
Windows Defender detects this threat.
This virus is part of the Win32/Alureon family of data-stealing malware. They can give a malicious hacker access to steal your confidential information such as your user names, passwords, and credit card data.
TrojanDropper:Win32/Resmu.A
Trojan:Win32/WebHijack.A!sys
Trojan:WinNT/Wador.A
Trojan:WinNT/Wador.A is malware installed as a Windows NT driver that writes code to certain versions of BIOS.
Trojan:WinNT/Duqu.A
Trojan:WinNT/Duqu.B
Trojan:WinNT/Duqu.B is a variant of WinNT/Duqu, a trojan that could allow unauthorized remote access and control of an affected computer. This trojan component injects payload instructions, detected as Trojan:Win32/Duqu.A, into other processes.
VirTool:WinNT/Koobface.P
Trojan:DOS/Ramnit.A
Windows Defender detects and removes this threat.
DOS/Ramnit.A is the malicious Master Boot Record (MBR) dropped by variants of the Ramnit family, in particular, Virus:Win32/Ramnit.AC.