Skip to main content
Skip to main content
11 entries found.
Updated on Jul 19, 2010
Worm:Win32/Stuxnet.A is the detection for a worm that spreads to all removable drives. It does this by dropping shortcut files (.LNK) that automatically run when the removable drive is accessed using an application that displays shortcut icons (for example, Windows Explorer).
 
It is capable of dropping and installing other components, injecting code into currently-running processes, and allowing backdoor access and control to the infected computer.
Alert level: severe
Updated on Jul 19, 2010
Worm:Win32/Stuxnet.B is the detection for a worm that spreads to all removable drives. It does this by dropping exploit shortcut files (files having .LNK file extension) that automatically run when the removable drive is accessed using an application that displays shortcut icons (for example, Windows Explorer). The shortcut files are detected as Exploit:Win32/CplLnk.A.
 
The worm is capable of dropping and installing other components, injecting code into currently-running processes, and allowing backdoor access and control to the infected computer.
Alert level: severe
Updated on Jul 30, 2010
Trojan:Win32/Stuxnet.A is a malware component of the Stuxnet worm. It monitors the activities between a legitimate application and a legitimate DLL file, possibly to steal information.
Alert level: severe
Updated on Aug 05, 2010
Windows Defender Antivirus detects and removes this threat.
 
This family of threats can install other malware, inject code in processes, and give a hacker backdoor access and control of your PC.
 
The family can spread via removable drives, such as USB flash drives. 
 
Win32/Stuxnet exploits a vulnerability that is discussed in Microsoft Security Bulletin MS10-046.
Alert level: severe
Updated on Jul 15, 2010

Windows Defender detects and removes this threat.

This is a generic detection for specially crafted, malicious shortcut files that target the vulnerability exploited by the Win32/Stuxnet family.

When you browse a folder that has the malicious shortcut using an app that displays shortcut icons, the malware runs instead.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Sep 17, 2010
Windows Defender Antivirus detects and removes this threat.
 
This trojan injects code into the running process LSASS.EXE.
 
It is installed by TrojanDropper:Win32/Stuxnet.A.
Alert level: severe
Updated on Oct 14, 2011
Trojan:Win32/Duqu.A is a trojan that injects malicious code into other processes. The trojan itself is injected into other processes by Trojan:WinNT/Duqu.A.
Alert level: severe
Updated on Oct 14, 2011
Trojan:Win32/Duqu.B is a detection for malicious code that has been injected into running processes, such as "lsass.exe", by Trojan:Win32/Duqu.A.
Alert level: severe
Updated on Oct 14, 2011
Trojan:Win32/Duqu.C is a detection for malicious code that has been injected into running processes, such as "lsass.exe", by Trojan:Win32/Duqu.B. Trojan:Win32/Duqu.C attempts to communicate with a remote server with an IP address 206.183.111.97 to download other code that may be used by the malware to perform other actions and allow unauthorized access of an affected computer.
Alert level: severe
Updated on Jun 27, 2012

This threat is detected by the Microsoft antivirus engine. Technical details are not currently available.

The Win32/Stuxnet family description has more information.

Alert level: severe
Updated on Sep 19, 2016
Alert level: severe