Skip to main content
Skip to main content
1008 entries found. Displaying page 17 of 51.
Updated on Dec 07, 2006
Alert level: severe
Updated on May 23, 2007
VirTool:WinNT/Mactu.A is a kernel-mode Trojan rootkit that hides files on an infected machine.
Alert level: severe
Updated on Dec 13, 2007
PWS:Win32/OnLineGames.BA is a trojan that logs keystrokes (such as usernames and passwords) and attempts to steal sensitive information related to the online game 'The Lord of the Rings' and the German version of the same game, 'Der Herr der Ringe'.
Alert level: severe
Updated on Jun 16, 2008
PWS:Win32/Frethog.gen!G is part of a multi-component password-stealing trojan that targets confidential data, such as account information, from Massive Multiplayer Online Role Playing Games (MMORPG) such as World of Warcraft (WoW).
Alert level: severe
Updated on Jun 25, 2008
PWS:Win32/Frethog.AD is a password-stealing trojan that targets confidential data, such as account information, from Massive Multiplayer Online Role Playing Games (MMORPG) like World of Warcraft (WoW), for example.
Alert level: severe
Updated on Jun 30, 2008
PWS:Win32/Lolyda.B is a family of trojans that sends account information from popular online games to a remote server. They may also download and execute arbitrary files.
Alert level: severe
Updated on Jul 07, 2008
PWS:Win32/OnlineGames.ZDR is a generic detection for a password-stealing trojan.
Alert level: severe
Updated on Aug 07, 2008
Trojan:Win32/Siapag.A is a trojan that may download a data file containing instructions for downloading additional malware. In the wild, we have seen Siapag.A downloading additional trojans that may be used to capture credentials for online games.
Alert level: severe
Updated on Oct 17, 2008
PWS:Win32/Lolyda.M is a trojan that steals account information of massively multiplayer online role-playing games (MMORPG) and sends account information to a remote server.
Alert level: severe
Updated on Oct 23, 2008
PWS:Win32/Frethog.AU is one variant of a large family of password-stealing trojans that target confidential data, such as account information, from Massive Multiplayer Online Games(MMORPG), such as World of Warcraft(WoW).
Alert level: severe
Updated on Dec 18, 2008
HackTool:Win32/PWDump.A is a tool used to obtain password hashes from Windows NT and 2000 machines.
Alert level: moderate
Updated on Dec 19, 2008
Trojan:Win32/Riberow.A is a trojan that gathers information about the infected system, which it sends back to a remote attacker.
Alert level: severe
Updated on Feb 26, 2009
Trojan:Win32/Blorso.A is installed in the system as a service. It connects back to a remote attacker to report successful infection of the system and to wait for further commands. It enables the remote attacker to gain full control of the system.
Alert level: severe
Updated on Feb 27, 2009
Win32/Sanpec.gen!A is a generic detection for obfuscated samples of password-stealing trojans that target confidential data, such as account information, from the online games "QQ Fantasy Online", "Dream Journey To The West Online", and "Lineage 2".
Alert level: severe
Updated on Mar 25, 2009

Windows Defender detects and removes this threat.

The threat is Microsoft's detection for tools that manipulate other processes to load and perform tasks on its behalf.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on May 14, 2009
HackTool:Win32/Dump is a command line tool that dumps password hashes from Windows NT's SAM(Security Accounts Manager) database. The dumped password hashes can be fed into an NT password auditing tool, such as L0phtCrack to recover the passwords of Windows NT users.
Alert level: high
Updated on Jun 18, 2009
TrojanDropper:Win32/Gamania.gen!A is a generic detection for malware that drops another malware, which is detected as PWS:Win32/Gamania.gen!A. It also attempts to disable various security programs by terminating certain processes and windows.
Alert level: severe
Updated on Aug 16, 2009
Spyware:Win32/HelpClear is a detection for the uninstall component of a program that downloads and installs additional programs without the affected user's consent.
Alert level: high
Updated on Sep 04, 2009
PWS:Win32/Bividon.A installs trojan components that capture logon credentials, user keystrokes and mouse operations, which are then sent to a remote server. The trojan components also attempt to stop security-related services, download configuration data files and update from a remote server. They may also report their presence on the system to the remote server.
Alert level: severe
Updated on Sep 17, 2009
TrojanSpy:Win32/Banker.MM is a password stealing trojan that captures online banking credentials, such as account login names and passwords, which are then relayed to a remote attacker.
Alert level: severe