Threat Search: 

ThreatExpert's Statistics for Mal/Behav-010 [Sophos]:

Mal/Behav-010 [Sophos] is also known as:
Threat AliasNumber of Incidents
Generic.PWS.Games [Ikarus]442
Trojan Horse [Symantec]234
Infostealer.Gampass [Symantec]194
Generic.dx [McAfee]116
Infostealer.Lemir [Symantec]95
TrojanDropper:Win32/Kolosha.A [Microsoft]87
Virus.Win32.Trojan [Ikarus]76
Trojan-GameThief.Win32.OnLineGames.uuld [Kaspersky Lab]72
Trojan:Win32/Cinmus.K [Microsoft]59
Win-Trojan/OnlineGameHack.26112.DA [AhnLab]54
Infostealer.Onlinegame [Symantec]50
Trojan.Win32.Cinmus [Ikarus]49
PWS-Mmorpg.gen [McAfee]40
Downloader [Symantec]37
Trojan-Spy.Gampass!sd6 [PC Tools]36
Trojan.Cinmeng [Symantec]35
Virus.Win32.OnLineGames [Ikarus]34
PWS:Win32/Lolyda.AC [Microsoft]31
Generic BackDoor [McAfee]28
Generic PWS.y [McAfee]28
Trojan.Win32.Pincav.qgb [Kaspersky Lab]25
Trojan.Generic [PC Tools]24
Backdoor:Win32/Visel.C [Microsoft]22
PWS:Win32/Lolyda.AG [Microsoft]22
Infostealer [Symantec]19
Generic FakeAlert!dw [McAfee]18
Adware-Cinmus.gen.u [McAfee]17
Adware-Cinmus [McAfee]16
Backdoor.Trojan [Symantec]16
BackDoor-CKB [McAfee]16
not-a-virus:AdWare.Win32.Cinmus [Ikarus]16
not-a-virus:AdWare.Win32.Cinmus.bkup [Kaspersky Lab]16
Trojan-GameThief.Win32.OnLineGames.uukp [Kaspersky Lab]16
Win-Trojan/OnlineGameHack.24576.PZ [AhnLab]16
Mal/Behav-010, Mal/Behav-027 [Sophos]14
Trojan-Spy.Lemir!sd6 [PC Tools]14
PWS:Win32/Zosernam.B [Microsoft]13
Backdoor.Win32.Visel.jl [Kaspersky Lab]12
Backdoor:Win32/PcClient [Microsoft]12
Trojan.Win32.Agent.aeuf [Kaspersky Lab]12
Trojan.Win32.Rootkit.C [Ikarus]12
Backdoor.Nuclear [Symantec]11
Trojan-Downloader.Win32.Agent.banu [Kaspersky Lab]11
Backdoor.Win32.Nuclear.ax [Kaspersky Lab]10
Backdoor.Win32.PcClient [Ikarus]10
Backdoor.Win32.PcClient.zs [Kaspersky Lab]10
Backdoor:Win32/Nuclear.BC [Microsoft]10
BackDoor-CQN.dll.gen [McAfee]10
BKDR_NUCLEAR1.A [Trend Micro]10
BKDR_PCCLIENT.WZ [Trend Micro]10
Mal/Behav-027, Mal/Behav-010 [Sophos]10
PWS-Gamania.gen.l [McAfee]10
Trojan.Cinmeng [PC Tools]10
Trojan:Win32/Agent.I [Microsoft]10
Trojan-Dropper.Agent [Ikarus]10
Trojan-Proxy [Ikarus]10
Virus.Win32.Spyware [Ikarus]10
Backdoor.PCCLient.OC [PC Tools]9
Backdoor.Visel!sd6 [PC Tools]9
Backdoor.Win32.Visel.c [Ikarus]9
Generic Keylogger.k [McAfee]9
MonitoringTool:Win32/SCKeyLog [Microsoft]9
Trojan.Agentdoc [Symantec]9
Trojan.Keyhabt [Symantec]9
Trojan-Spy.Win32.SCKeyLog.ap [Kaspersky Lab]9
Win-Trojan/Xema.variant [AhnLab]9
Infostealer.Banker.C [Symantec]8
Trojan-GameThief.Win32.OnLineGames.uunn [Kaspersky Lab]8
Win-Trojan/OnlineGameHack.27648.CM [AhnLab]8
Backdoor.Nuclear.IY [PC Tools]7
not-a-virus:AdWare.Win32.Stud.n [Kaspersky Lab]7
Trojan-Spy.Win32.Banker.bht [Ikarus]7
Backdoor.Win32.Visel.af [Kaspersky Lab]6
MalwareScope.Trojan-PWS.Game [Ikarus]6
PWS:Win32/Lolyda.AF [Microsoft]6
PWS:Win32/Mmosteal!rts [Microsoft]6
PWS-Manresoz [McAfee]6
Trojan:Win32/Boupke.gen!A [Microsoft]6
Trojan-GameThief.Win32.OnLineGames.uvrn [Kaspersky Lab]6
Trojan-Spy.Win32.SCKeyLog [Ikarus]6
TrojanSpy:Win32/Mafod!rts [Microsoft]6
TSPY_GAMEOL.AQ [Trend Micro]6
Win-Trojan/Malware.30720 [AhnLab]6
Backdoor.Win32.Visel.nr [Kaspersky Lab]5
BKDR_FORMADOR.J [Trend Micro]5
Downloader.gen.a [McAfee]5
Generic Downloader.x [McAfee]5
KerBot [McAfee]5
PWS:Win32/OnLineGames.GK [Microsoft]5
PWS-OnlineGames.gl [McAfee]5
Trojan.OnlineGames.Gen.77 [PC Tools]5
Trojan-Downloader.Win32.Small [Ikarus]5
W32.Kernelbot.A [Symantec]5
Win-Trojan/Nuclear.223232.K [AhnLab]5
Adware.Cinmus [PC Tools]4
Adware-Cinmus!a [McAfee]4
Backdoor.Pigeon [Ikarus]4
Backdoor.Visel!sd5 [PC Tools]4
Backdoor.Win32.PcClient.gu [Kaspersky Lab]4
Backdoor.Win32.Visel.at [Ikarus]4

Mal/Behav-010 [Sophos] has the following possible countries of origin:
OriginNumber of Incidents
China48
Brazil21
Russian Federation5
Italy2
Republic of Korea2
Taiwan2
Germany1
Norway1
Turkey1
United Kingdom1

Mal/Behav-010 [Sophos] is known to be created as:
%FontsDir%\gth18585.dll
%FontsDir%\gth68450.dll
%FontsDir%\gth68455.dll
%FontsDir%\gth69450.dll
%FontsDir%\gth69455.dll
%FontsDir%\mnmhisrv.dll
%System%\12345.dll
%System%\3875fd80.dll
%System%\6to4ex.dll
%System%\arjrller.dll
%System%\byshell32.dll
%System%\compbatc.dll
%System%\directx32.exe
%System%\dmnlv.exe
%System%\dmoea.exe
%System%\dopdy.dll
%System%\drivers\tcpip4.sys
%System%\freero.exe
%System%\fywd.dll
%System%\inteldrv.dll
%System%\jkkhii.dll
%System%\jlgejgei32fg.dll
%System%\lxmjsa.dll
%System%\mh104.dll
%System%\msdrv.dll
%System%\mtlrd.dll
%System%\protector.exe
%System%\pwhpho.dll
%System%\racmond.dll
%System%\register.exe
%System%\rtkhjkdr.exe
%System%\rtragcub.exe
%System%\rundll.dll
%System%\sdra64.exe
%System%\server.exe
%System%\sp.dll
%System%\spj.dll
%System%\ss12c704dll.dll
%System%\ss12c705dll.dll
%System%\steelkernel.dll
%System%\steelkernel32.dll
%System%\stormlkernel32.dll
%System%\svp.dll
%System%\sys\smss.exe
%System%\sysload2.exe
%System%\system32.sys
%System%\temp.dll
%System%\ticisms.dll
%System%\vv1dap32.dll
%System%\winldr.dll
%System%\winstart.dll
%System%\winsyslik.dll
%System%\wmitpfs.dll
%System%\wsnpoema.exe
%System%\wsttrs.dll
%System%\xhvhtmdc.dll
%System%\yrifcghb.dll
%System%\zcsfzdjh.dll
%Temp%\bin\level 2\awft1.exe
%Temp%\bin\level 3\thermite.exe
%Temp%\bin\level 4\cpil.exe
%Temp%\bin\level 4\cpilsuite1.exe
%Temp%\lhgjyit0.dll
%Temp%\lhgjyit1.dll
%Temp%\lhgjyit2.dll
%Windir%\bincdwsa.exe
%Windir%\dndsioc.exe
%Windir%\fiosectc.exe
%Windir%\issms32.exe
%Windir%\lpk.dll
%Windir%\mfchlp64.exe
%Windir%\ortfta.dll
%Windir%\system.dll
%Windir%\temp\ed.exe
%Windir%\ticisms.exe
%Windir%\windows\install.sys
%Windir%\windows\install32.sys
%Windir%\windows\root.sys
%Windir%\windows\system32\setup.sys
%Windir%\windows\wisnl.sys
%Windir%\yuiabct.exe
c:\order_dyny.exe
c:\server.exe
Notes:
  • %FontsDir% is a variable that refers to a virtual folder containing fonts. A typical path is C:\Windows\Fonts.
  • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
  • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
  • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.