Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
Trojan:Win32/Bamital.G is a trojan component that executes a payload component installed by TrojanDropper:Win32/Bamital.G.
Alert level: severe
Updated on Apr 28, 2010
TrojanDropper:VBS/Pidrop.B is a detection for JavaScript that drops other malware including TrojanDropper:VBS/Pidrop.A and TrojanDropper:Win32/Emold.C.
Alert level: severe
Updated on Apr 28, 2010
TrojanDropper:VBS/Pidrop.A is a detection for JavaScript that drops other malware detected as TrojanDropper:Win32/Emold.C.
Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:Win32/Rochap.F is a trojan component dropped and installed by TrojanDropper:Win32/Rochap.F. It connects to a certain Web site to download another malware, which is detected as Trojan:Win32/Rochap.B.
Alert level: severe
Updated on Apr 28, 2010
TrojanDropper:Win32/Pidrop.A is a detection for a malicious .PDF document that drops VBScripts that attempt to drop and execute other malware detected as TrojanDropper:Win32/Emold.C.
Alert level: severe
Updated on May 26, 2010
TrojanDropper:Win32/Surldoe.gen!A is a trojan that masquerades as an installer of legitimate software, but also installs malware on a targeted system. It drops and runs two or more files, one of which is usually a clean installer file, whilst the others are malware. It is commonly used to install variants of the Win32/Rbot family, but variants of other malware families have also been observed being installed, including Win32/Vundo, Win32/Matcash, and Win32/Brancud.
Alert level: severe
Updated on May 26, 2010
TrojanDropper:Win32/Conficker.gen!A drops and executes variants of Win32/Conficker. In the wild we have observed this trojan installing Worm:Win32/Conficker.D on affected machines.
 
Win32/Conficker infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled. It may also spread via removable drives and weak administrator passwords. It disables several important system services and security products.
 
Microsoft strongly recommends that users apply the update referred to in Security Bulletin MS08-067 immediately.
 
Microsoft also recommends that users ensure that their network passwords are strong to prevent this worm from spreading via weak administrator passwords. More information is available here.
 
Microsoft also recommends that users apply an update that changes the AutoPlay functionality in Windows to prevent this worm from spreading via USB drives. More information is available in the Microsoft Knowledgebase Article KB971029.
Alert level: severe
Updated on Dec 07, 2015

Windows Defender detects and removes this threat.

This trojan can install other malware or unwanted software onto your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Sep 08, 2015

Windows Defender detects and removes this threat.

This trojan can install other malware or unwanted software onto your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Sep 15, 2015

Windows Defender detects and removes this threat.

This trojan can install other malware or unwanted software onto your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Sep 20, 2015
Windows Defender Antivirus detects and removes this threat.

This threat drops and installs Trojan:Win32/EyeStye, a trojan that captures keystrokes and steals login credentials through a method known as "form grabbing".

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Sep 27, 2015

Windows Defender detects and removes this threat.

This trojan can install other malware or unwanted software onto your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on May 29, 2014

TrojanDropper:Win32/Rovnix.A is a trojan that modifies the New Technology File System (NTFS) boot sector of the hard drive to execute other malware. The trojan also installs a component, detected as Trojan:Win32/Rovnix.A, to restart the computer so the modified NTFS boot sector will execute.

Alert level: severe
Updated on Feb 14, 2024
Alert level: severe
Updated on Apr 11, 2011
This threat has been renamed to Rogue:Win32/FakeSmoke.
Alert level: low
Updated on Apr 11, 2011
TrojanDropper:Win32/MultiDropper.AN is a trojan that drops other malware, identified as Trojan:Win32/MSNMon.A and TrojanSpy:Win32/Banker.DR, into the Windows system folder of an affected computer.
Alert level: severe
Updated on Aug 05, 2016

Microsoft Defender Antivirus detects and removes this threat.

This threat uses an infected Microsoft Office file to install Ransom:Win32/Tobfy ransomware onto your PC.

It can arrive on your PC as spam email attachment, usually as a Word file (.doc) using social-engineering to convince you to enable macros after opening the document.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Nov 11, 2016

Microsoft Defender Antivirus detects and removes this threat.

This threat can steal your personal information and lower your PC security settings. 

It can be installed on your PC through network shares or infected removable drives, such as a USB flash drives.

See the Win32/Sality family description for more information.

Alert level: severe
Updated on Jan 21, 2015

Windows Defender detects and removes this threat.

This trojan can install other malware or unwanted software onto your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Mar 12, 2015

Windows Defender detects and removes this threat.

This trojan can install other malware or unwanted software onto your PC.

Find out ways that malware can get on your PC.

Alert level: severe