Threat Database Malware HackTool:Win32/Mailpassview

HackTool:Win32/Mailpassview

By SpideyMan in Malware

Threat Scorecard

Ranking: 3,560
Threat Level: 10 % (Normal)
Infected Computers: 9,328
First Seen: December 8, 2010
Last Seen: August 1, 2025
OS(es) Affected: Windows

HackTool:Win32/Mailpassview is a freeware program that is used to show passwords for numerous email programs including Microsoft Outlook, Microsoft Outlook Express, Windows Live Mail, Windows Mail, etc. HackTool:Win32/Mailpassview has a graphical user interface (GUI), but can be executed without being shown to the infected computer user by using command line switches to save the gathered password information to various formats. HackTool:Win32/Mailpassview is used by Trojan:Win32/Nedsym in order to steal passwords from the infected computer users. HackTool:Win32/Mailpassview is used by cybercriminals to attack numerous email accounts and steal personal information in order to use innocent PC users' accounts for mass spamming campaigns. You should uninstall HackTool:Win32/Mailpassview as quickly as possible.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Fortinet W32/Generic!tr
Ikarus Trojan-Banker.Win32.Banbra
AntiVir SPR/Tool.Mailpassview.500
ClamAV WIN.Spy.Banker-266
Antiy-AVL PSWTool/Win32.ProductKey
DrWeb Tool.PassSteel.945
Comodo ApplicUnwnt.Win32.PSWTool.ProductKey.~SIA
Kaspersky not-a-virus:PSWTool.Win32.ProductKey.cq
McAfee Tool-PassView
AVG Dropper.Generic7.AMLO
Fortinet W32/Jorik_Chisburg.ATE!tr
Ikarus HackTool.Win32.Mailpassview
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.E
AntiVir TR/Dropper.MSIL.Gen2
DrWeb Trojan.DownLoader7.54566

SpyHunter Detects & Remove HackTool:Win32/Mailpassview

File System Details

HackTool:Win32/Mailpassview may create the following file(s):
# File Name MD5 Detections
1. ProduKey.exe 08012b4107432873710958ec45c7e1ac 598
2. mailpv.exe db19075b6a18a679cc10f4a6a8be7b3d 346
3. produkey_setup.exe 37cd2136411c498d7db016b25399f0de 21
4. mailpv_setup.exe a3e4d4572fa0e1d2291ead6eea6326f8 10
5. Java.exe e85fd99c90bcbae12ef285200b7cf645 7
6. brXZVDgUbgP.exe b9e79d66904faa76938a6a683f1daa2f 3
7. DRIVERSATA.exe 161d6f0c6fb8494ca638b798a5755079 2
8. sof.exe 813e75848f38ee4d4d564beeed0e720d 2
9. poe.exe 6c1c04087f37b6b176a0c35cc9d5cfd0 1
10. 4572.exe aed1601f3f936de9174dcfd9a46c3440 1
11. keygen.exe
12. T.R gdata.exe
13. fltlib.dll
14. keymaker.exe
15. zw7pekms.exe
16. Office activator.exe
17. adbcd.dll
18. KMService.exe
19. KeyGen (FFF).exe
20. OfficeResetAuto.exe
21. ashampkeygen.exe
22. AutoKMS.exe
More files

1 Comment

Frank McCaffery Reply

I am only gretful that MS detected this trojan as soon as it was loaded. Goodneess knows what trouble with my A/C it could have caused by spamming their emails via ME. With all the facilities available today, I'm surprised that the actual perpetrators cannot be traced back to the first server from the culprit, then a detection placed on the server to catch the culprits.

Thanks again MS.

Frank McCaffery

Trending

Most Viewed

Loading...