45 entries found. Displaying page 2 of 3.
Updated on Jun 01, 2015
This is a generic detection for malicious files that are obfuscated using particular techniques to prevent their detection or analysis.
Alert level: severe
Updated on Oct 13, 2014
This is a generic detection for malicious files that are obfuscated using particular techniques to prevent their detection or analysis.
Alert level: severe
Updated on May 27, 2010
VirTool:Win32/Injector.gen!AM is a protection mechanism used by malware in order to avoid detection.
Alert level: severe
Updated on May 27, 2010
VirTool:Win32/Injector.gen!AC is a protection mechanism used by malware in order to avoid detection.
Alert level: severe
Updated on May 27, 2010
VirTool:Win32/Injector.gen!AD is a protection mechanism used by malware in order to avoid detection.
Alert level: severe
Updated on Apr 11, 2011
Virus:Win32/Lurka.A is a file infecting virus that targets Windows executables of .EXE file extension. This virus infects files that have a system date older than January 1, 2008.
Alert level: severe
Updated on May 26, 2010
VirTool:Win32/VBinder.gen!GL is a generic detection for obfuscated malware. The loader, which is detected as VirTool:Win32/VBinder.gen!GL, is written in Visual Basic and the malicious code, which may have virtually any purpose, is encrypted.
Alert level: severe
Updated on Sep 22, 2011
TrojanDownloader:Win32/Camec.B downloads and installs another file, which is also detected as TrojanDownloader:Win32/Camec.B. It disables User Account Control (UAC) and gathers information about the affected computer, which it sends back to a remote server. Its downloaded component is installed as...
Alert level: severe
Updated on Apr 11, 2011
Trojan:Win32/Rochap.D is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Hamweq.BM is a worm that spreads via removable drives, such as USB memory sticks. It contains an IRC-based backdoor, which may be used by a remote attacker to order the affected machine to participate in Distributed Denial of Service attacks, or to download and execute arbitrary files.
Alert level: severe
Updated on Apr 11, 2011
Worm:WinNT/Lurka.A is a worm that runs as a service, spreads to removable drives and drops a file infecting virus detected as Virus:Win32/Lurka.A.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.UE is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Pushbot.IR is a worm that may spread via MSN Messenger and/or AIM. The worm also contains backdoor functionality that allows unauthorized access to an affected machine. This worm does not spread automatically upon installation, but must be ordered to spread by a remote attacker.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Pushbot.CA is a worm that may spread via MSN Messenger and/or AIM. The worm also contains backdoor functionality that allows unauthorized access to an affected machine. This worm does not spread automatically upon installation, but must be ordered to spread by a remote attacker.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.KN is an IRC controlled backdoor which allows a remote attacker to request that it perform a wide range of activities on the affected system, including downloading and executing arbitrary files, stealing information, deleting files, terminating processes, running servers, and...
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Busifom.A is a worm - a self-propagating program that can spread itself from one computer to another. Worms may spread themselves via a variety of different channels in order to compromise new computers. Commonly, worms may spread directly by copying themselves to removable or network...
Alert level: severe
Updated on Aug 01, 2011
Exploit:HTML/CVE-2011-1255 is the detection for malicious code that exploits a remote code execution vulnerability in Internet Explorer. The vulnerability is discussed in CVE-2011-1255 and is resolved with the release of Microsoft Security Bulletin MS11-050.
Alert level: severe
Updated on Oct 06, 2013
Microsoft security software detects and removes this family of threats. The TrojanDropper:Win32/Swisyn family of malware install and run files on your PC, including other malware and unwanted software. Trojans in this family can be installed by other malware.
Alert level: severe
Updated on Apr 11, 2011
TrojanSpy:Win32/Bancos.YX is a member of the TrojanSpy:Win32/Bancos family, malware that steals sensitive information from the affected user's computer
Alert level: severe
Updated on Apr 17, 2012
VirTool:Win32/Injector.T is a detection for malware that uses a certain method of code obfuscation in order to avoid detection. This malware injects other code into a newly spawned process and directly executes it in memory.
Alert level: severe