Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
PWS:Win32/Zbot.XV is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Kurit!rts is a detection for trojans that have been added to Microsoft signatures after advanced automated analysis. These trojans may steal sensitive data.
Alert level: high
Updated on Apr 11, 2011
PWS:Win32/Zbot.SE is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Chif.A is a trojan password stealer. It attempts to collect logon credentials from various installed FTP software.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Delmes.A is a trojan that gathers stored email account credentials and sends the captured data to a predefined email address.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.gen!Z is a heuristic detection for files that exhibit suspicious characteristics and behaviors.
 
Should you have this detection reported, and you are uncertain as to the source or integrity of the file reported on, please submit the file to us for further analysis.
Alert level: severe
Updated on Jun 14, 2011
PWS:Win32/Lolyda.BF collects user and computer information and sends this to its remote server. It may also monitor network activity on the infected computer in order to steal user credentials.
Alert level: severe
Updated on Apr 11, 2011
PWS:MSIL/Parple.A is a trojan written to execute in the Microsoft .NET Framework on Windows computers. It drops and executes several script components that are used to gather sensitive and personal information. The gathered information is sent to a remote server for use by a remote attacker.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lineage.AT is a Trojan that targets computers running certain versions of Microsoft Windows. The Trojan terminates security-related processes, drops a file that captures certain passwords, and runs a file that it downloads from a Web site.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Ldpinch.UM is detection for a group of general variants of Win32/Ldpinch, a family of password-stealing trojans. This trojan gathers private user data, such as passwords, from the host computer and sends the data to the attacker at a preset e-mail address. The Win32/Ldpinch trojans use their own Simple Mail Transfer Protocol (SMTP) engine or a web-based proxy for sending the e-mail, thus copies of the sent e-mail will not appear in the affected user's e-mail client.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/OnlineGames.ZDR is a generic detection for a password-stealing trojan.
Alert level: severe
Updated on Apr 11, 2011
Win32/Prefsap is a family of trojans that attempts to steal users’ FTP account details and sends this information to a remote server. It has been observed being downloaded by variants of the TrojanDownloader:Win32/Cbeplay family.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lolyda.S is the Microsoft detection for a DLL component used mostly by the Win32/Lolyda family of password-stealing trojans that sends account information from popular online games to a remote server. Win32/Lolyda.S captures logon credentials for the online game "QQ Fantasy Online" (QQFO) and sends the collected data to a remote server.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/OnLineGames.AE is a trojan that steals password information for the popular online game World of Warcraft.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lolyda.AA is a trojan that steals sensitive information related to popular online games and sends it to a remote attacker. It may also download and execute arbitrary files.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.XD is a password-stealing trojan that contains limited backdoor functionality. It is capable of stealing login credentials for certain sites, cached passwords, and information contained in certificates and cookies. It is often distributed as an attachment to spam e-mail messages.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lineage.CC is a password stealing trojan that targets popular online games. It may drop and load a payload component that performs the data theft, and a rootkit component that hides the trojan and its associated components from the affected user.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lolyda.AF is a component of Win32/Lolyda - a family of trojans that sends account information from popular online games to a remote server. They may also download and execute arbitrary files.
 
PWS:Win32/Lolyda.AF has been distributed as a 32,153-byte DLL component, used for stealing information related to popular online games and a popular chat application.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Bividon.A installs trojan components that capture logon credentials, user keystrokes and mouse operations, which are then sent to a remote server. The trojan components also attempt to stop security-related services, download configuration data files and update from a remote server. They may also report their presence on the system to the remote server.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.ZY is a password stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected machine.
Alert level: severe