Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on May 05, 2016

Windows Defender detects and removes this threat.

This hacktool can be used to retrieve the passwords stored in your web browser cache. Malware can also use this tool to steal your personal information.

You might have downloaded this onto your PC as "WebBrowserPassView", or malware may have installed it on your PC.

Find out ways that malware can get on your PC

Alert level: high
Updated on May 17, 2010
PWS:Win32/Hupigon.gen!F is a generic detection for the password-stealing component of the Win32/Hupigon family of trojans. It steals system information from the infected computer and sends it back to a remote server.
Alert level: severe
Updated on Mar 05, 2012

PWS:Win32/Bzub.gen is a generic detection for the installer of a malicious web Browser Helper Object (BHO) or a DLL that may monitor typed logon credentials for accessed websites.

Alert level: severe
Updated on Mar 11, 2015

Windows Defender detects and removes this threat.

This threat can steal your personal information, such as your user names and passwords. It sends the stolen information to a malicious hacker.

This threat might have got on your PC through an exploit kit or phishing attack.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 14, 2006
PWS:Win32/Banker.JX is a Trojan that retrieves system messages, keystrokes, active-window titles, and personal banking data when the user accesses a specific banking Web site. It sends this information to a specific e-mail address. This Trojan may be dropped by Win32/Mydoom.BI@mm. 
Alert level: severe
Updated on Nov 06, 2016

Microsoft Defender Antivirus detects and removes this threat.

This threat can steal your personal information, such as your user names and passwords. It sends the stolen information to a malicious hacker.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Nov 17, 2016

Microsoft Defender Antivirus detects and removes this threat.

This threat can steal your personal information, such as your user names and passwords. It sends the stolen information to a malicious hacker.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Sep 06, 2012

PWS:Win64/Sinowal.gen!B is a component of the Win32/Sinowal family.

Win32/Sinowal is a family of password-stealing and backdoor trojans. These trojans may to steal sensitive information by disrupting SEcure Socket Layer (SSL) transactions (those that use certificates) from your computer. Some Sinowal components may also be able to hide or disguise themselves to avoid detection, and perform operations pretending to be trusted processes, such as "explorer.exe", to bypass your computer's security defences.

Alert level: severe
Updated on Aug 05, 2011
PWS:Win32/Zbot.gen!AC is a trojan that infects other files, lowers Internet browser security, steals passwords and allows unauthorized access and control of an affected computer.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lineage.AT is a Trojan that targets computers running certain versions of Microsoft Windows. The Trojan terminates security-related processes, drops a file that captures certain passwords, and runs a file that it downloads from a Web site.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Ldpinch.UM is detection for a group of general variants of Win32/Ldpinch, a family of password-stealing trojans. This trojan gathers private user data, such as passwords, from the host computer and sends the data to the attacker at a preset e-mail address. The Win32/Ldpinch trojans use their own Simple Mail Transfer Protocol (SMTP) engine or a web-based proxy for sending the e-mail, thus copies of the sent e-mail will not appear in the affected user's e-mail client.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/OnlineGames.ZDR is a generic detection for a password-stealing trojan.
Alert level: severe
Updated on Apr 11, 2011
Win32/Prefsap is a family of trojans that attempts to steal users’ FTP account details and sends this information to a remote server. It has been observed being downloaded by variants of the TrojanDownloader:Win32/Cbeplay family.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lolyda.S is the Microsoft detection for a DLL component used mostly by the Win32/Lolyda family of password-stealing trojans that sends account information from popular online games to a remote server. Win32/Lolyda.S captures logon credentials for the online game "QQ Fantasy Online" (QQFO) and sends the collected data to a remote server.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/OnLineGames.AE is a trojan that steals password information for the popular online game World of Warcraft.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lolyda.AA is a trojan that steals sensitive information related to popular online games and sends it to a remote attacker. It may also download and execute arbitrary files.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Zbot.XD is a password-stealing trojan that contains limited backdoor functionality. It is capable of stealing login credentials for certain sites, cached passwords, and information contained in certificates and cookies. It is often distributed as an attachment to spam e-mail messages.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lineage.CC is a password stealing trojan that targets popular online games. It may drop and load a payload component that performs the data theft, and a rootkit component that hides the trojan and its associated components from the affected user.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Lolyda.AF is a component of Win32/Lolyda - a family of trojans that sends account information from popular online games to a remote server. They may also download and execute arbitrary files.
 
PWS:Win32/Lolyda.AF has been distributed as a 32,153-byte DLL component, used for stealing information related to popular online games and a popular chat application.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Bividon.A installs trojan components that capture logon credentials, user keystrokes and mouse operations, which are then sent to a remote server. The trojan components also attempt to stop security-related services, download configuration data files and update from a remote server. They may also report their presence on the system to the remote server.
Alert level: severe