Jump to content

Recommended Posts

Hello,

I found this virus a couple weeks ago named Heuristics.Reserved.Word.Exploit, and of course deleted it, but I am itching to know what this virus does, where it's from, and the overall risk level if possible.

From what I've gathered from Google, I saw one forum that suggested something about a password stealer, which I assumed was a sort of keylogger? But since there was an insignificant amount of information to conclude what it was, I was entailed to ask the MB forums for further information on the virus.

This was what I had in my log:

----------------------------------------------------------------------------------------------------------------------------------------

Malwarebytes' Anti-Malware 1.50.1.1100

www.malwarebytes.org

Database version: 6223

Windows 6.1.7600

Internet Explorer 8.0.7600.16385

3/30/2011 11:17:57 PM

mbam-log-2011-03-30 (23-17-57).txt

Scan type: Quick scan

Objects scanned: 158593

Time elapsed: 1 minute(s), 14 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 1

Folders Infected: 0

Files Infected: 1

...

Files Infected:

c:\Windows\Temp\svhost.exe (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.

----------------------------------------------------------------------------------------------------------------------------------------

Thank you for any feedback on this issue,

Jeremy

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.