Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
PWS:Win32/Zbot.XV is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Kurit!rts is a detection for trojans that have been added to Microsoft signatures after advanced automated analysis. These trojans may steal sensitive data.
Alert level: high
Updated on Apr 11, 2011
PWS:Win32/Zbot.SE is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Chif.A is a trojan password stealer. It attempts to collect logon credentials from various installed FTP software.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Delmes.A is a trojan that gathers stored email account credentials and sends the captured data to a predefined email address.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.gen!Z is a heuristic detection for files that exhibit suspicious characteristics and behaviors.
 
Should you have this detection reported, and you are uncertain as to the source or integrity of the file reported on, please submit the file to us for further analysis.
Alert level: severe
Updated on Apr 11, 2011
PWS:MSIL/Parple.A is a trojan written to execute in the Microsoft .NET Framework on Windows computers. It drops and executes several script components that are used to gather sensitive and personal information. The gathered information is sent to a remote server for use by a remote attacker.
Alert level: severe
Updated on Jun 14, 2011
PWS:Win32/Lolyda.BF collects user and computer information and sends this to its remote server. It may also monitor network activity on the infected computer in order to steal user credentials.
Alert level: severe
Updated on Sep 06, 2012

PWS:Win64/Sinowal.gen!B is a component of the Win32/Sinowal family.

Win32/Sinowal is a family of password-stealing and backdoor trojans. These trojans may to steal sensitive information by disrupting SEcure Socket Layer (SSL) transactions (those that use certificates) from your computer. Some Sinowal components may also be able to hide or disguise themselves to avoid detection, and perform operations pretending to be trusted processes, such as "explorer.exe", to bypass your computer's security defences.

Alert level: severe
Updated on Aug 26, 2011
PWS:Win32/Payazol.B is a trojan that is specifically used to capture personal information, such as user names and passwords, and then send that information to a remote attacker.
Alert level: severe
Updated on Aug 27, 2012
PWS:Win32/Kiction.A is a trojan that is specifically used to capture personal information, such as user names and passwords, and then send that information to a remote attacker.
Alert level: severe
Updated on Mar 11, 2015

Windows Defender detects and removes this threat.

This threat can steal your personal information, such as your user names and passwords. It sends the stolen information to a malicious hacker.

This threat might have got on your PC through an exploit kit or phishing attack.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 14, 2006
PWS:Win32/Banker.JX is a Trojan that retrieves system messages, keystrokes, active-window titles, and personal banking data when the user accesses a specific banking Web site. It sends this information to a specific e-mail address. This Trojan may be dropped by Win32/Mydoom.BI@mm. 
Alert level: severe
Updated on Mar 08, 2018

Microsoft Defender Antivirus detects and removes this threat.

PWS:Win32/Dofoil.D is a trojan that steals user names and passwords for certain FTP applications and Microsoft Outlook.

On March 6, 2018, behavior monitoring and machine learning technologies in Microsoft Defender Antivirus stopped a Dofoil variant (also known as Smoke Loader) that tried to infect more than 400,000 computers. The massive campaign aimed to install a cryptocurrency miner that uses victim computers' resources for coin mining purposes. Learn how artificial intelligence stopped the attack within minutes:

Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign

Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.XB is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.XN is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Ldpinch.AX is a member of Win32/Ldpinch - a family of trojans that steals sensitive information from affected machines and sends it to a remote attacker. In particular, Ldpinch variants target passwords for a comprehensive selection of FTP, chat and e-mail clients, as well as those stored by browsers and in protected storage.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Ldpinch.AY is a member of Win32/Ldpinch - a family of trojans that steals sensitive information from affected machines and sends it to a remote attacker. In particular, Ldpinch variants target passwords for a comprehensive selection of FTP, chat and e-mail clients, as well as those stored by browsers and in protected storage.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Ldpinch.C is a member of Win32/Ldpinch - a family of trojans that steals sensitive information from affected machines and sends it to a remote attacker. In particular, Ldpinch variants target passwords for a comprehensive selection of FTP, chat and e-mail clients, as well as those stored by browsers and in protected storage.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Ldpinch.ZE is a member of Win32/Ldpinch - a family of trojans that steals sensitive information from affected machines and sends it to a remote attacker. In particular, Ldpinch variants target passwords for a comprehensive selection of FTP, chat and e-mail clients, as well as those stored by browsers and in protected storage.
Alert level: severe