Packed.Win32.Tdss.f is a Trojan that can hide its presence when infecting system files by injecting a code on legitimate Windows processes. This highly advanced method of infection is called rootkit technique. Packed.Win32.Tdss.f is also capable of creating a backdoor port to allow a remote attacker to gain full access on the compromised computer without user’s consent. This approach may give an attacker access to sensitive data that are stored on the system. More



Packed.Generic.200 is a usual detection for malicious files that were packed or encrypted to conceal itself from antivirus programs. Packed.Generic.200 can further harm the computer by downloading more threats from a remote server. This detection may cover Backdoor.Tidserv, Trojan.Fakeavalert, Trojan.Zlob families. Malware authors typically encrypt the Trojan using a packer that in not commonly used for lawful intention. More


WMA.Wimad.Drp is a detection method to identify malicious or infected MP3 files. This Trojan usually spreads through file-sharing networks and infects multimedia files on victim’s computer. The Trojan may also infect several driver and dynamic link library (DLL) files on the compromised system. More

Trojan.Mournor or W32.Mournor

Trojan.Mournor or W32.Mournor is a computer worm that alters certain system files and downloads additional threats coming from a remote server. The worm may propagate by infecting removable USB drives and network shared drives that have weak protection. It replaces genuine explorer.exe file with a modified one and moved it to a different folder. This method will allow the Trojan to execute when user opens Windows Explorer. More



Backdoor.Tidserv is a Trojan horse that allows remote unauthorized access on infected computer by creating a backdoor port. Backdoor.Tidserv remains hidden from the system with its use of advanced rootkit techniques. Once inside the computer, this Trojan can redirect Internet browser’s search result to a set of web addresses. Upon visiting said web sites, the Trojan will display pop-up ads and fake virus scanners to promote a rogue security product. More



Trojan.Giframe is a heuristic detection method to identify infected GIF images that may contain HTML tags crafted to redirect infected computer to malicious web sites.

When the Trojan executes, it will drop several files under Temporary folder of Windows. These files can consist of malicious GIF images. See Associated Files and Folders section for a complete list. The Trojan may then inject these files into Internet browser as a funny button that may induce user to click on it. It also uses trickery like online promotion, lottery or greeting card. More


Infostealer.Ldpinch.H is a Trojan that can steal File Transfer Protocol (FTP) account details from victim and sends the gathered data to a remote computer. Author of this Trojan intend to use stolen credentials for succeeding attack. This threat can also make changes to system settings and add an entry to Windows registry. More



Trojan.Proscks.C identified by security experts as proxy Trojans. Computer that is contaminated with a proxy Trojan may serve as bridge between the attacker, the victim, and the Internet. Remote attackers may able to perform malicious actions globally and cover-up the assault using a proxy setting established from victim’s computer. This threat is capable of altering Windows system files to launch an instance of infection when computer starts. More

Trojan.Wsnpoem detection


Trojan.Wsnpoem is a Trojan horse for Windows operating system. This Trojan may access the Internet and receive commands from a remote server using an HTTP request. More


Trojan.Brisv.A!inf is a detection for a various malicious and infected multimedia files that were endangered with Trojan.Brisv.A. Trojan.Brisv.A!inf tries to search the infected computer for files with the extension of .mp3, .wmv, .wma .mp2 and .mp3 and converts, insert a functionality to download malicious code from a remote server. More