File Search: 

ThreatExpert's awareness of the file "boot.com":

Across all ThreatExpert reports, the file "boot.com" has sometimes been a threat.
File "boot.com" has the following statistics:
Total number of reports analysed611,932
Number of cases that involved the file "boot.com"243
Number of incidents when this file was found to be a threat70
Statistical volume of cases when "boot.com" was a threat29%
Please enable javascript to display the chart.
Notes:
  • Please note that the name of the file should NOT be used to define if it is legitimate or not. Such determination can only be made by observing its dynamic behaviour.
  • In order to check a file, please submit it to ThreatExpert.
  • For a comprehensive pro-active protection against threats, please consider ThreatFire - our behavioral antivirus solution.
The file "boot.com" is known to be created under the following filenames:
%AppData%\dv6173880x\yesbron.com
%CommonPrograms%\startup\explorer.exe
%CommonPrograms%\startup\services.exe
%LocalSettings%\history\windump.exe
%Profiles%\default user\templates\winword.doc.exe
%Profiles%\default user\templates\winword2.doc.exe
%ProgramFiles%\adult tube xxx codec\antivirus\codec.exe
%ProgramFiles%\adult tube xxx codec\antivirus\lol.exe
%ProgramFiles%\mirc\irc bot\stupid.sys
%ProgramFiles%\winrar\rarext64.dll
%Programs%\startup\startupfolder.com
%System%\c_44292k.com
%System%\desot.exe
%System%\desote.exe
%System%\dllcache\6to4.dll
%System%\dookyw.dll
%System%\drivers\winscr32.dll
%System%\fuvirus.exe
%System%\ineters.exe
%System%\internt.exe
%System%\kltbesf.exe
%System%\logcomd.exe
%System%\logonui_.exe
%System%\mcim.exe
%System%\microsoft.exe
%System%\mssrv32.exe
%System%\mydoor0.dll
%System%\myinsdll.exe
%System%\n7533\smss.exe
%System%\n7533\sv711738830r.exe
%System%\notepd.exe
%System%\ntkrnlpa.exesvcsblsu.exe
%System%\owvo.exe
%System%\progmon.exe
%System%\pump.exe
%System%\qdoken.dll
%System%\qzp3jtzcsfsh.dll
%System%\sbsb.exe
%System%\secpol.exe
%System%\sp00lv.exe
%System%\spool.exe
%System%\ufo.exe
%System%\vmdetdhc.exe
%System%\wbem\lsass.exe
%System%\winsock32.dll
%System%\yyikri.dll
%Temp%\_dangerous_\boot.com
%Temp%\_dangerous_\kilroy.com
%Temp%\001faa43.sys
%Temp%\3\srchsp.dll
%Temp%\boot.com
%Temp%\jmgorrlu.exe
%Temp%\jqqdvn\jqqdvn.exe
%Temp%\jqqdvn\tjhnrirl.exe
%Temp%\kafan virlist 2009.03.23\090323-9-3.exe
%Temp%\nark\arp.exe
%Temp%\nark\asr_fmt.exe
%Temp%\nark\asr_ldm.exe
%Temp%\nark\asr_pfu.exe
%Temp%\nark\cacls.exe
%Temp%\nark\clean_all.exe
%Temp%\nark\cliconfg.exe
%Temp%\nark\clipsrv.exe
%Temp%\nark\cmmon32.exe
%Temp%\nark\conime.exe
%Temp%\nark\ddeshare.exe
%Temp%\nark\diskperf.exe
%Temp%\nark\dplaysvr.exe
%Temp%\nark\dpnsvr.exe
%Temp%\nark\dvdupgrd.exe
%Temp%\nark\esentutl.exe
%Temp%\nark\fontview.exe
%Temp%\pft7.tmp\asinstall.dll
%Temp%\pingdrop.com
%Temp%\test.exe
%Temp%\virus folder\nlgcgqqv.exe
%Temp%\winupdter.exe
%Temp%\zpskon_1266277438.exe
%Temp%\zpskon_1266350217.exe
%Temp%\zpskon_1266374015.exe
%Temp%\zpskon_1266374192.exe
%Temp%\zpskon_1266379095.exe
%Temp%\zpskon_1266392428.exe
%Templates%\winword.doc.exe
%Templates%\winword2.doc.exe
%UserProfile%\gwibsq.exe
%UserProfile%\hbqn.exe
%UserProfile%\hsrj.exe
%UserProfile%\ocdnjf.exe
%UserProfile%\poajr.exe
%Windir%\bl-21.exe
%Windir%\calc.exe
%Windir%\debug.sys
%Windir%\j6442922.exe
%Windir%\killdll.dll
%Windir%\o4442927.exe
%Windir%\ss3unstl.exe
%Windir%\systems.com
%Windir%\temp\_wutl50.dll
%Windir%\winlogon.exe
Notes:
  • %AppData% is a variable that refers to the file system directory that serves as a common repository for application-specific data. A typical path is C:\Documents and Settings\[UserName]\Application Data.
  • %CommonPrograms% is a variable that refers to the file system directory that contains the directories for the common program groups that appear on the Start menu for all users. A typical path is C:\Documents and Settings\All Users\Start Menu\Programs (Windows NT/2000/XP).
  • %LocalSettings% is a variable that specifies the current user's local settings folder. By default, this is C:\Documents and Settings\[UserName]\Local Settings (Windows NT/2000/XP).
  • %Profiles% is a variable that refers to the file system directory containing user profile folders. A typical path is C:\Documents and Settings.
  • %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
  • %Programs% is a variable that refers to the file system directory that contains the user's program groups. A typical path is C:\Documents and Settings\[UserName]\Start Menu\Programs.
  • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
  • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
  • %Templates% is a variable that refers to the file system directory that serves as a common repository for document templates. A typical path is C:\Documents and Settings\[UserName]\Templates.
  • %UserProfile% is a variable that specifies the current user's profile folder. By default, this is C:\Documents and Settings\[UserName] (Windows NT/2000/XP).
  • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.

The following threats are known to be associated with the file "boot.com":
Threat AliasNumber of Incidents
Trojan:Win32/Alureon.gen!J [Microsoft]52
Adware.Maxifiles [PC Tools]22
Rootkit.Win32.TDSS [Ikarus]18
Packed.Generic.200 [Symantec]11
DNSChanger.f.gen.a [McAfee]8
Trojan.TDss.1 [Ikarus]7
Trojan.Win32.Alureon [Ikarus]7
DNSChanger.gen [McAfee]6
Mal/TDSS-A, Mal/EncPk-CZ [Sophos]6
TrojanDropper:Win32/Cutwail.AN [Microsoft]6
Backdoor.Tidserv [Symantec]5
Mal/Generic-A [Sophos]5
Mal/EncPk-CZ [Sophos]4
Packed.Win32.Tdss.c [Kaspersky Lab]4
Worm.Win32.AutoTDSS [Ikarus]4
Backdoor.Trojan [Symantec]3
FakeAlert-AG.gen.a [McAfee]3
FakeAlert-SpywareGuard.gen.b [McAfee]2
Mal/EncPk-HT [Sophos]2
Mal/TDSS-A [Sophos]2
Mal/TDSSPack-Q, Mal/EncPk-HT, Mal/TDSS-A [Sophos]2
Packed.Win32.Krap.d [Kaspersky Lab]2
Trojan.Generic [Ikarus]2
Trojan.TDss [Ikarus]2
Trojan.Win32.Agent.aeee [Kaspersky Lab]2
Win-Trojan/Xema.variant [AhnLab]2
Worm.Win32.AutoRun [Ikarus]2
Worm.Win32.AutoRun.stz [Kaspersky Lab]2
Adware.Slagent [PC Tools]1
Adware.Slagent [Symantec]1
BtDr.Ping [McAfee]1
DNSChanger!bf [McAfee]1
DNSChanger.ac [McAfee]1
DNSChanger.gen.a [McAfee]1
Downloader.MisleadApp [PC Tools]1
Downloader.MisleadApp [Symantec]1
Dropper/Ping [AhnLab]1
Ezboot.Dropper [Ikarus]1
FakeAlert-FD [McAfee]1
Junk/Bootdrop [Sophos]1
Mal/EncPk-GB [Sophos]1
Mal/EncPk-IQ [Sophos]1
Mal/Generic-A, Mal/TDSSPack-N [Sophos]1
Mal/TDSSPack-N [Sophos]1
Mal/TibsPak [Sophos]1
Packed.Win32.Krap [Ikarus]1
Packed.Win32.Tdss.e [Kaspersky Lab]1
PE_VIRUT.LJ [Trend Micro]1
Rootkit.Win32.TDSS.cap [Kaspersky Lab]1
TOOB.32000 [Trend Micro]1
Troj/FakeAle-LE [Sophos]1
Trojan Horse [Symantec]1
Trojan.Dropper [Symantec]1
Trojan.Fakeavalert!sd6 [PC Tools]1
Trojan.SillyWorm [PC Tools]1
Trojan.Small!sd6 [PC Tools]1
Trojan.Win32.Agent [Ikarus]1
Trojan.Win32.Agent.akjs [Kaspersky Lab]1
Trojan.Win32.Agent.aott [Kaspersky Lab]1
Trojan.Win32.Small.yso [Kaspersky Lab]1
Trojan.Zlob [Symantec]1
Trojan:Win32/Alureon.CO [Microsoft]1
Trojan-Downloader.Win32.Agent.aiby [Kaspersky Lab]1
Trojan-Downloader.Win32.Agent.auog [Kaspersky Lab]1
Trojan-Downloader.Win32.Injecter.avy [Kaspersky Lab]1
Trojan-Dropper.Win32.Agent.aaif [Kaspersky Lab]1
Trojan-Dropper.Win32.Agent.zea [Kaspersky Lab]1
Virus.Dropper [Symantec]1
Virus.Win32.Fabot [Ikarus]1
Virus.Win32.Fasec [Ikarus]1
Virus.Win32.Gipor [Ikarus]1
Virus.Win32.Virut.bq [Kaspersky Lab]1
W32.SillyDC [Symantec]1
W32.Virut.W [Symantec]1
W32/AutoRun-SX [Sophos]1
W32/Virut.j [McAfee]1
Win32/Autotdss.worm.30208.FZ [AhnLab]1
Win-Trojan/Injecter.35328.F [AhnLab]1
Worm.Win32.AutoRun.afei [Kaspersky Lab]1
Worm.Win32.AutoRun.atqb [Kaspersky Lab]1
Worm.Win32.AutoRun.ayto [Kaspersky Lab]1
Worm.Win32.AutoRun.pph [Kaspersky Lab]1
Worm.Win32.AutoRun.saz [Kaspersky Lab]1
Worm.Win32.AutoRun.tsv [Kaspersky Lab]1
Worm.Win32.AutoTDSS.akv [Kaspersky Lab]1
Worm.Win32.AutoTDSS.bfz [Kaspersky Lab]1
Worm.Win32.AutoTDSS.gy [Kaspersky Lab]1
Worm.Win32.VB.li [Ikarus]1
WORM_ALUREON.DEN [Trend Micro]1