Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
23 entries found.
Displaying page 1
of 2.
Win32/Virut
Windows Defender detects and removes this threat.
This virus family can give a malicious hacker access to your PC by opening a backdoor connection to an IRC server.
Alert level:
severe
Virus:Win32/Virut.AB
Virus:Win32/Virut.AB is a polymorphic appending virus that infects .EXE and .SCR files. Win32/Virut.AB may additionally connect with a remote Internet Relay Chat (IRC) server and await commands, allowing a remote attacker to download and execute arbitrary files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.AP
Virus:Win32/Virut.AP is a polymorphic appending file infector that infects files with .EXE and .SCR file extensions and may open a backdoor connection allowing a remote attacker to download and run files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.V
Virus:Win32/Virut.V is a file infector that targets .EXE and .SCR files. It also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.X
Virus:Win32/Virut.X is generic detection for a polymorphic file infector that targets .EXE and .SCR files. This virus also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer. It uses advanced techniques to hide infection.
Alert level:
severe
Virus:Win32/Virut.BB
Virus:Win32/Virut.BB is a polymorphic virus that infects files with the EXE or SCR file extension. It may open a backdoor connection, allowing a remote attacker to download and run files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.BF
Virus:Win32/Virut.BF is a polymorphic and memory resident file infecting virus that infects .EXE and .SCR files. Win32/Virut.BF also opens a backdoor in the infected system by connecting to an IRC server, allowing a remote attacker to send commands remotely.
Alert level:
severe
Virus:Win32/Virut.E
Virus:Win32/Virut.E is a polymorphic and memory-resident file-infecting virus that infects .EXE and .SCR files on a computer. Win32/Virut.E also opens a backdoor by connecting to an IRC server, allowing an attacker to send commands remotely.
Alert level:
severe
Virus:Win32/Virut.gen!epo
Virus:Win32/Virut.gen!epo is a generic detection for a polymorphic and memory-resident file infecting virus that is also capable of allowing unauthorized remote access and control of your infected computer.
Alert level:
severe
Virus:Win32/Virut.AH
Virus:Win32/Virut.AH is a polymorphic file infector that targets .EXE and .SCR files. This virus also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.L
Virus:Win32/Virut.L is a polymorphic file infector that targets .EXE and .SCR files. It also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.BN
Windows Defender detects and removes this threat.
This threat can give a malicious hacker access and control of your PC to download and run files.
See the Win32/Virut family description for more information.
Alert level:
severe
Virus:Win32/Virut.Y
Virus:Win32/Virut.Y is a file infector that targets .EXE and .SCR files. It also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.gen!J
Virus:Win32/Virut.gen!J is a generic detection for files infected by members of the Win32/Virut virus family. Files detected as Virus:Win32/Virut.gen!J are likely to be corrupted remnants, and are unable to perform its infection routine.
Alert level:
severe
TrojanDropper:Win32/Srizbi
TrojanDropper:Win32/Srizbi is detection for a collection of trojan droppers that commonly install a backdoor that allows remote access to infected systems. This backdoor may then be used by remote attackers to upload and install further malicious or unwanted software on the system and is identified as Spammer:WinNT/Srizbi.gen.
Alert level:
severe
Virus:Win32/Virut.BM
Virus:Win32/Virut.BM is a polymorphic file infector that targets .EXE and .SCR files. This virus also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer.
Alert level:
severe
Virus:HTML/Virut.BH
Virus:HTML/Virut.BH is a detection for HTML script appended to Web pages by Virus:Win32/Virut.BM. The appended script contains an IFrame and redirection URL that attempts to download other malware.
Alert level:
severe
Virus:Win32/Virut.A
Win32/Virut.A is a file infecting virus that infects .EXE and .SCR files accessed on infected systems. Win32/Virut.A also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and run files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.B
Virus:Win32/Virut.B is a file infecting virus that infects .EXE and .SCR files accessed on infected systems. Virus:Win32/Virut.B also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and run files on the infected computer.
Alert level:
severe
Virus:Win32/Virut.gen!AI
Virus:Win32/Virut.gen!AI is Microsoft's generic detection for a family of polymorphic, file-appending viruses that target and infect .EXE and .SCR files. Virut variants also have a backdoor functionality by connecting to an IRC server and allowing a remote attacker to download and run files on the infected system.
Alert level:
severe