Home / Spyware Encyclopedia / PSW.generic << Back

Recommendation to Automatically remove PSW.generic


Our products can remove PSW.generic and thousands of other Virus and Spyware automatically and instantly.

PSW.generic Details


  • Category PSW
  • Discovered 10/25/2024 4:12:15 PM
  • Modified 10/25/2024 5:51:41 PM
  • Threat Level Medium
  • Category Description
    This family of Trojans steals passwords, normally system passwords from victim machines. They search for system files which contain confidential information such as passwords and Internet access telephone numbers and then send this information to an email address coded into the body of the Trojan. The 'master' or user of the illegal program will then retrieve and misuse this information. Most common behavior: 1. Ask for password using fake window 2. Change ICQ, MSN and AOL configuration 3. Get cached Windows passwords

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2ab429eb.exe 578309Ada99.com1.4.0.03f2524ffc80b13ae5e6efe3359e64e5d 
220e8b2d.exe 4000  60827a2332f44fa01823f617d35cddd2 
sys_temtrayrs.exe 611560  5f0b1bf3cce3bc2a7d2332261e3903bd 
sys_temtrayrs.jpg 611560  5f0b1bf3cce3bc2a7d2332261e3903bd 
sys_temtrayrs.txt 611560  5f0b1bf3cce3bc2a7d2332261e3903bd 
63e502a3.exe 611560  5f0b1bf3cce3bc2a7d2332261e3903bd 
993b38c0.exe 3584  3ff22d0aeae7ce07e99f4fa4645a3e55 
9029c831e4e28aa3cd1ddba29699ee121557d498cfafb085f6cbaed608235ab5e0e483badf9ead153a1a9fe30bb020568a4.exe 66132  539207da0cab2add7b009ad5bd87c168 
07e410ed39389e05db65241e89dfbd87.exe 978944 0.0.0.007e410ed39389e05db65241e89dfbd87 
3892c35ba5addc5b2a4a14041fcc9972.exe 719360Veritas Technologies LLC16.0.2.561663892c35ba5addc5b2a4a14041fcc9972 

The following Registry Entries were created:
..\System\CurrentControlSet\Enum\root\legacy_winserverviewrs\(Default)
..\System\CurrentControlSet\Services\winserverviewrs\(Default)
..\Software\Classes\2ab429eb.mynshandler\(Default)
..\Software\Classes\Clsid\{e8cfc029-8420-4eae-adef-915bdc77e1dc}\(Default)
..\System\CurrentControlSet\Enum\root\legacy_winserverview\(Default)
..\System\CurrentControlSet\Services\WinServerView\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware