Threat Database Malware HackTool:Win32/Mailpassview

HackTool:Win32/Mailpassview

By SpideyMan in Malware

Threat Scorecard

Ranking: 2,360
Threat Level: 10 % (Normal)
Infected Computers: 8,841
First Seen: December 8, 2010
Last Seen: March 24, 2024
OS(es) Affected: Windows

HackTool:Win32/Mailpassview is a freeware program that is used to show passwords for numerous email programs including Microsoft Outlook, Microsoft Outlook Express, Windows Live Mail, Windows Mail, etc. HackTool:Win32/Mailpassview has a graphical user interface (GUI), but can be executed without being shown to the infected computer user by using command line switches to save the gathered password information to various formats. HackTool:Win32/Mailpassview is used by Trojan:Win32/Nedsym in order to steal passwords from the infected computer users. HackTool:Win32/Mailpassview is used by cybercriminals to attack numerous email accounts and steal personal information in order to use innocent PC users' accounts for mass spamming campaigns. You should uninstall HackTool:Win32/Mailpassview as quickly as possible.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Fortinet W32/Generic!tr
Ikarus Trojan-Banker.Win32.Banbra
AntiVir SPR/Tool.Mailpassview.500
ClamAV WIN.Spy.Banker-266
Antiy-AVL PSWTool/Win32.ProductKey
DrWeb Tool.PassSteel.945
Comodo ApplicUnwnt.Win32.PSWTool.ProductKey.~SIA
Kaspersky not-a-virus:PSWTool.Win32.ProductKey.cq
McAfee Tool-PassView
AVG Dropper.Generic7.AMLO
Fortinet W32/Jorik_Chisburg.ATE!tr
Ikarus HackTool.Win32.Mailpassview
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.E
AntiVir TR/Dropper.MSIL.Gen2
DrWeb Trojan.DownLoader7.54566

SpyHunter Detects & Remove HackTool:Win32/Mailpassview

File System Details

HackTool:Win32/Mailpassview may create the following file(s):
# File Name MD5 Detections
1. ProduKey.exe 08012b4107432873710958ec45c7e1ac 588
2. mailpv.exe db19075b6a18a679cc10f4a6a8be7b3d 338
3. mailpv.exe fcc8aca8cbf9226ea65198530118a012 37
4. produkey_setup.exe 37cd2136411c498d7db016b25399f0de 20
5. mailpv_setup.exe a3e4d4572fa0e1d2291ead6eea6326f8 10
6. Java.exe e85fd99c90bcbae12ef285200b7cf645 7
7. brXZVDgUbgP.exe b9e79d66904faa76938a6a683f1daa2f 3
8. DRIVERSATA.exe 161d6f0c6fb8494ca638b798a5755079 2
9. sof.exe 813e75848f38ee4d4d564beeed0e720d 2
10. mailpv_setup.exe ac1ce510d8a7ab9d2a3126c0883b8eb4 1
11. poe.exe 6c1c04087f37b6b176a0c35cc9d5cfd0 1
12. 4572.exe aed1601f3f936de9174dcfd9a46c3440 1
13. keygen.exe
14. T.R gdata.exe
15. fltlib.dll
16. keymaker.exe
17. zw7pekms.exe
18. Office activator.exe
19. adbcd.dll
20. KMService.exe
21. KeyGen (FFF).exe
22. OfficeResetAuto.exe
23. ashampkeygen.exe
24. AutoKMS.exe

1 Comment

Frank McCaffery Reply

I am only gretful that MS detected this trojan as soon as it was loaded. Goodneess knows what trouble with my A/C it could have caused by spamming their emails via ME. With all the facilities available today, I'm surprised that the actual perpetrators cannot be traced back to the first server from the culprit, then a detection placed on the server to catch the culprits.

Thanks again MS.

Frank McCaffery

Trending

Most Viewed

Loading...