Skip to main content
Skip to main content
Microsoft Security Intelligence
168 entries found. Displaying page 5 of 9.
Updated on Jul 07, 2007

HackTool:Win32/Ntillusion is the detection for a user-mode rootkit. It uses SetWindowsHookEx to inject itself into each running process on an infected computer. It then hooks the Import Address Table entries for several functions in order to redirect them to functions implemented by the rootkit.

Alert level: high
Updated on Sep 09, 2008
VirTool:WinNT/Xantvi.gen!A is a generic detection for a kernel-mode rootkit driver that terminates processes and attempts to hide the presence of related malware on an affected machine.
Alert level: severe
Updated on Dec 02, 2009

Microsoft security software detects this threat.

This threat can send malicious data to your PC and corrupt some driver files, making them unusable..

See the Win32/Alureon family description for more information.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Feb 17, 2011

Trojan:DOS/Yoddos is a bootkit malware that infects the file "userinit.exe" to decode and execute its encoded component, which is a trojan downloader.

Alert level: severe
Updated on May 10, 2011

VirTool:WinNT/Bohu.A is a malicious kernel-mode driver and rootkit that is installed by TrojanDropper:Win32/Bohu.B. It is used to monitor registry keys pertaining to the malware and to prevent security processes from executing.

Alert level: severe
Updated on Dec 08, 2006
Alert level: severe
Updated on Oct 11, 2021

This is a detection of a generic rootkit, which is malicious software that gets installed at the kernel level to hide itself and its activities or to maintain persistence.

For information about this trojan and other human-operated malware campaigns, read these blog posts:

Alert level: severe
Updated on Jan 29, 2009
TrojanDropper:Win32/Alureon.J is the detection for a DLL component of malware that is usually dropped and installed in the system by other malware. It may download and execute other files, block access to certain websites, and redirect searches. For more information, please refer to the description of the Win32/Alureon family.
Alert level: severe
Updated on Mar 09, 2010
Virus:Win32/Alureon.G is a detection for system drivers infected by members of the Win32/Alureon family.
 
Win32/Alureon is a multi-component family of trojans involved in a broad range of subversive activities online in order to generate revenue from various sources for its controllers. Mostly, Win32/Alureon is associated with moderating affected user's activities online to the attacker's benefit. As such, the various components of this family have been used for:
  • modifying affected user's search results (search hijacking)
  • redirecting affected user's browsing to sites of the attacker's choice (browser hijacking)
  • changing DNS settings in order to redirect users to sites of the attacker's choice without the affected user's knowledge
  • downloading and executing arbitrary files, including additional components and other malware
  • serving illegitimate advertising
  • installing Rogue security software
  • banner clicking
 
Win32/Alureon also utilizes advanced stealth techniques in order to hinder the detection and removal of its various components.
 
As some variants of this trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after the trojan is removed from the computer.
Alert level: severe
Updated on Aug 27, 2010
Trojan:WinNT/Alureon.L is a driver, which is dropped by Trojan:Win32/Alureon.DX. It may hijack Internet search results and download arbitrary files. It is also responsible for determining what Alureon component to inject into a Windows process.
Alert level: severe
Updated on Mar 29, 2011

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Mar 29, 2011

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Mar 29, 2011

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Mar 29, 2011

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Mar 29, 2011

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Oct 19, 2011

Trojan:DOS/Sinowal.Q is the detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal.

Alert level: severe
Updated on Dec 20, 2011

Virus:Win32/Sirefef.N is a component of Win32/Sirefef - a multi-component family of malware that moderates your Internet experience by changing search results and generating pay-per-click advertising revenue for its controllers. The family consists of multiple parts that perform different functions, such as downloading updates and additional components, hiding existing components, or performing a payload.

Caution: Win32/Sirefef is a dangerous threat that uses advanced stealth techniques in order to hinder its detection and removal. If you are infected with Sirefef, we recommend you take the following steps to remove this threat from your computer:

Before you begin you will need:

- A computer that is not infected and is connected to the Internet. You will use this computer to download a copy of the Microsoft Safety Scanner
- A blank CD, DVD or USB drive. You will use this CD, DVD or USB drive to run the Scanner on your infected computer 

  1. Download a copy of the Microsoft Safety Scanner from a clean, uninfected computer
  2. Save a copy of the Scanner on a blank CD, DVD, or USB drive
  3. Restart the infected computer
  4. Insert the CD, DVD, or USB drive into your infected computer and run the Scanner
  5. Let the Scanner clean your computer and remove any infections it finds

After running the Scanner, ensure that your antivirus product is up-to-date. You can update Microsoft security products by downloading the latest definitions at this link: Get the latest definitions.

As a consequence of being infected with this threat, you may need to repair and reconfigure some Windows security features. Please see Additional remediation steps in this entry for more information.

Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Mar 25, 2009
Alert level: severe
Updated on Dec 08, 2010

TrojanDropper:Win32/Sirefef.B is a trojan that drops Win32/Sirefef - a multi-component family of malware that moderates your Internet experience by changing search results and generating pay-per-click advertising revenue for its controllers. The family consists of multiple parts that perform different functions, such as downloading updates and additional components, hiding existing components, or performing a payload.

Caution: Win32/Sirefef is a dangerous threat that uses advanced stealth techniques in order to hinder its detection and removal. If you are infected with Sirefef, we recommend you take the following steps to remove this threat from your computer:

Before you begin you will need:

- A computer that is not infected and is connected to the Internet. You will use this computer to download a copy of the Microsoft Safety Scanner
- A blank CD, DVD or USB drive. You will use this CD, DVD or USB drive to run the Scanner on your infected computer 

  1. Download a copy of the Microsoft Safety Scanner from a clean, uninfected computer
  2. Save a copy of the Scanner on a blank CD, DVD, or USB drive
  3. Restart the infected computer
  4. Insert the CD, DVD, or USB drive into your infected computer and run the Scanner
  5. Let the Scanner clean your computer and remove any infections it finds

After running the Scanner, ensure that your antivirus product is up-to-date. You can update Microsoft security products by downloading the latest definitions at this link: Get the latest definitions.

As a consequence of being infected with this threat, you may need to repair and reconfigure some Windows security features. Please see Additional remediation steps in this entry for more information.

Alert level: severe