Home > General > RemoteAdmin.Win32.NetCat


The following threat category was identified: Threat CategoryDescription A hacktool that could be used by attackers to break into a system Memory Modifications There was a new process created in the Short URL to this thread: https://techguy.org/723053 Log in with Facebook Log in with Twitter Log in with Google Your name or email address: Do you already have an account? All rights reserved.Newsletter|Contact Us|Privacy Statement|Terms of Use|Trademarks|Site Feedback HOMEDETECTIONSSHOPSUPPORTSPANISHFRENCHHOMEDETECTIONSSHOPSUPPORTSPANISHFRENCH 1 12, 2016 Permalink nc.exe nc.exe UsbFix 2016-12-01T12:14:08+00:00 Tags: Aplicacion/NetCat, Application.RemoteAdmin.RGU, ApplicUnsaf.Win32.RemoteAdmin.NetCat.A, Hack.NetCat.c (classic), Hacktool/NetCat.B, HKTL_NETCAT, NetCat, NetCat.A, not-a-virus:RemoteAdmin.Win32.NetCat.a, PUP.NetCat/Variant, RemoteAdmin.NetCat.61440[h], RemoteAdmin.W32.NetCat.a!c, TechNet Products IT Resources Downloads Training Support Products Windows Windows Server System Center Microsoft Edge   Office Office 365 Exchange Server   SQL Server SharePoint Products Skype for Business See all

Sign in Join the community No votes. Copyright 2011 - 2016 USBFix | By El Desaparecido & SOSVirus | All Right Reserved.FacebookTwitterYoutubeGoogle+PaypalEmail Nous utilisons des cookies pour vous garantir la meilleure expérience sur notre site. Style Default Style Contact Us Help Home Top RSS Terms and Rules Copyright © TechGuy, Inc. All rights reserved.

Si vous continuez à utiliser ce dernier, nous considérerons que vous acceptez l'utilisation des cookies. Moved by Daniel Trautman Tuesday, March 02, 2010 8:34 PM Request for file identification (From:Microsoft Online: Services Sign In for Windows) Tuesday, February 09, 2010 4:49 PM Reply | Quote Microsoft Creates a startup registry entry. Jan 27, 2017 Solved Browsers Crash, PC shuts down - BrowserModifier Win32/SupTab pwilliam, Nov 13, 2016, in forum: Virus & Other Malware Removal Replies: 23 Views: 798 pwilliam Nov 17, 2016

More comments Leave your comment... ? Staff Online Now dvk01 Moderator valis Moderator flavallee Trusted Advisor Advertisement Tech Support Guy Home Forums > Security & Malware Removal > Virus & Other Malware Removal > Home Forums Forums Microsoft Customer Support Microsoft Community Forums Script Center   Sign in United States (English) Brasil (Português)Česká republika (Čeština)Deutschland (Deutsch)España (Español)France (Français)Indonesia (Bahasa)Italia (Italiano)România (Română)Türkiye (Türkçe)Россия (Русский)ישראל (עברית)المملكة العربية السعودية (العربية)ไทย (ไทย)대한민국 (한국어)中华人民共和国 Thread Status: Not open for further replies.

Copyright © 2017 ThreatExpert. Stay logged in Sign up now! ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a Could you please help me get rid of these?

Advertisement Recent Posts Low internet speed CapriAnupam replied Mar 2, 2017 at 8:20 AM What's the best Oddba11 replied Mar 2, 2017 at 7:37 AM Seeing Google Analytics and... ThreatSearch: ThreatExpert's Statistics for not-a-virus:RemoteAdmin.Win32.NetCat.a [Kaspersky Lab]: not-a-virus:RemoteAdmin.Win32.NetCat.a [Kaspersky Lab] is also known as: Threat AliasNumber of Incidents NetCat [Symantec]25 Backdoor.NetCat32.C [PC Tools]13 not-a-virus:RemoteAdmin.Win32.NetCat [Kaspersky Lab]9 not-a-virus:RemoteAdmin.Win32.NetCat.jd [Kaspersky Lab]7 Memory Modifications There were new processes created in the system: Process NameProcess FilenameMain Module Size lssas.exe%System%\lssas.exe794,624 bytes [filename of the sample #1][file and pathname of the sample #1]794,624 bytes There were Copyright © 2017 ThreatExpert.

Advertisement ACA529 Thread Starter Joined: Nov 15, 2005 Messages: 6,117 My anti-virus picked up RemoteAdmin.Win32.NetCat, Win32.TrojanDownloader.Small, and Win32.TrojanDropper.Small. read review All rights reserved. Loading... The Information is provided on an "as is" basis.

Please start a New Thread if you're having a similar issue.View our Welcome Guide to learn how to use this site. FREE SUPPORT !YOU KNOW ?NICOLAS COOLMANUSB ANTIVIRUS BY SOSVIRUSSOSVIRUS FORUMLE JARDIN DE STEPHANEMERCERIE BRETAGNEESPACE CONDUITEPopularRecent rapport-de-stage-electricien.doc .exe September 23rd, 2016 Manuel.doc .exe October 7th, 2016 BronCoder wsf VBS/Agent.NHT May 18th, 2016 Possible Security Risk Attention! Compressed file Inner file SHA256: 91a71b7b5e2af1391352fd2bc76ec22986b8d7f113924614daf87ed2e56b3046 File name: nc.exe Detection ratio: 26 / 56 Analysis date: 2015-10-03 00:43:37 UTC ( 1 year, 5 months ago ) Analysis File detail Relationships Additional

First name Last name Username * Email * Password * Confirm password * * Required field Cancel Sign up × Sign in Username or email Password Forgot your password? While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP). %System% is a variable that refers to the System folder. Click here to join today!

By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP). %Windir% is a variable that refers to the Windows installation folder. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP). %Temp% is a variable that refers to the temporary folder in the short path form.

Found it on my Acer?And how to go away? Visit ThreatExpert web site |Close Report Submission Summary: Submission details: Submission received: 23 March 2016, 10:39:42 Processing time: 5 min 23 sec Submitted sample: File MD5: 0xAB41B1E2DB77CEBD9E2779110EE3915D File SHA-1: 0x4122CF816AAA01E63CFB76CD151F2851BC055481 Filesize: Join over 733,556 other people just like you! Are you looking for the solution to your computer problem?

No, create an account now. Find out more about VirusTotal Community. Join our site today to ask your question. Yes, my password is: Forgot your password?

PE header basic information Target machine Intel 386 or later processors and compatible processors Compilation timestamp 2004-12-29 18:07:16 Entry Point 0x00004AC3 Number of sections 3 PE sections Name Virtual address Virtual Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 12:30:39 PM, on 6/20/2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16674) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe If you choose to participate, the online survey will be presented to you when you leave the Technet Web site.Would you like to participate? If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Newer Than: Search this thread only Search this forum only Display results as threads Useful Searches Recent Posts More... RemoteAdmin.Win32.NetCat Discussion in 'Virus & Other Malware Removal' started by ACA529, Jun 20, 2008. TerryNet replied Mar 2, 2017 at 7:26 AM "TSG Coffee and Café with... No comments.

Email: Recover password Cancel × Join VirusTotal Community Interact with other VirusTotal users and have an active voice when fighting today's Internet threats. Tech Support Guy is completely free -- paid for by advertisers and donations. The Information is provided on an "as is" basis. Gr3iz replied Mar 2, 2017 at 7:11 AM Lost Worlds and New Species Found valis replied Mar 2, 2017 at 7:10 AM Loading...

No one has voted on this item yet, be the first one to do so! All rights reserved. Privacy statement  © 2017 Microsoft.