Lionic |
Riskware.Win32.Ammyy.1!c |
tehtris |
Generic.Malware |
Cynet |
Malicious (score: 100) |
Skyhigh |
RemAdm-Ammyy |
ALYac |
Gen:Variant.Application.RemoteAdmin.6 |
Cylance |
Unsafe |
VIPRE |
Gen:Variant.Application.RemoteAdmin.6 |
Sangfor |
Riskware.Win32.Remoteadmin.Vo0h |
CrowdStrike |
win/grayware_confidence_100% (W) |
BitDefender |
Gen:Variant.Application.RemoteAdmin.6 |
K7GW |
Hacktool ( 005519b11 ) |
K7AntiVirus |
Hacktool ( 005519b11 ) |
Arcabit |
Trojan.Application.RemoteAdmin.6 |
Symantec |
Remacc.Ammyy |
Elastic |
malicious (high confidence) |
ESET-NOD32 |
a variant of Win32/RemoteAdmin.Ammyy.B potentially unsafe |
Avast |
Win32:MiscX-gen [PUP] |
Kaspersky |
not-a-virus:RemoteAdmin.Win32.Ammyy.aagu |
NANO-Antivirus |
Riskware.Win32.RemoteAdmin.hvrqcz |
MicroWorld-eScan |
Gen:Variant.Application.RemoteAdmin.6 |
Rising |
HackTool.Ammyy!1.C8BE (CLASSIC) |
Emsisoft |
Gen:Variant.Application.RemoteAdmin.6 (B) |
DrWeb |
Program.RemoteAdmin.908 |
Zillya |
Tool.Ammyy.Win32.745 |
McAfeeD |
ti!7FABA6269C05 |
CTX |
exe.remote-access-trojan.ammyy |
Sophos |
Generic ML PUA (PUA) |
SentinelOne |
Static AI - Suspicious PE |
FireEye |
Generic.mg.9054fe003778dd05 |
Jiangmin |
RemoteAdmin.Ammyy.io |
Webroot |
W32.Trojan.Ra |
Google |
Detected |
Antiy-AVL |
RiskWare[RemoteAdmin]/Win32.Ammyy |
Kingsoft |
malware.kb.a.994 |
Gridinsoft |
Risk.Win32.RemoteAdmin.vl!c |
Xcitium |
Malware@#10h2cm3e0pdkq |
Microsoft |
PUA:Win32/AmmyyAdmin |
ZoneAlarm |
not-a-virus:RemoteAdmin.Win32.Ammyy.aagu |
GData |
Win32.Riskware.RemoteAdmin.A |
Varist |
W32/ABApplication.YPZL-5154 |
AhnLab-V3 |
Unwanted/Win32.RemoteAdmin.R278120 |
McAfee |
RemAdm-Ammyy |
DeepInstinct |
MALICIOUS |
Malwarebytes |
PUP.Optional.Ammyy |
TrendMicro-HouseCall |
TROJ_GEN.R002H07HC23 |
Yandex |
Trojan.Igent.bUpDWV.19 |
huorong |
HackTool/AmmyyAdmin.a |
MaxSecure |
Virus.Trojan.Ammyy.wrj |
Fortinet |
Riskware/Ammyy |
AVG |
Win32:MiscX-gen [PUP] |