Threat Search: 

ThreatExpert's Statistics for Trojan:Win32/Alureon.gen!J [Microsoft]:

Trojan:Win32/Alureon.gen!J [Microsoft] is also known as:
Threat AliasNumber of Incidents
Trojan Horse [Symantec]6,267
DNSChanger.gen [McAfee]6,196
Mal/AdvPatch-A, Mal/Broute-A [Sophos]6,166
Trojan.Win32.Agent.akwc [Kaspersky Lab]6,059
Trojan.Win32.Agent [Ikarus]3,159
Worm.AutoRun.GEN [PC Tools]3,154
Trojan.Win32.Alureon.J [Ikarus]3,045
Trojan.Alureon.J [PC Tools]1,411
Mal/AdvPatch-A [Sophos]239
Trojan.Win32.Alureon [Ikarus]217
Packed.Generic.200 [Symantec]207
Rootkit.Win32.TDSS [Ikarus]178
Generic PWS.o [McAfee]170
Trojan.Win32.Agent.akxd [Kaspersky Lab]170
Mal/Generic-A [Sophos]165
W32.Tidserv [Symantec]131
W32.SillyDC [Symantec]129
W32/Autorun.worm.bl [McAfee]125
Rootkit.Win32.Agent.dqy [Kaspersky Lab]104
Trojan.Passcrack.A [Ikarus]102
Backdoor.Tidserv [Symantec]100
Trojan.Win32.Small.yon [Kaspersky Lab]94
Rootkit.Win32.TDSS.cfj [Kaspersky Lab]86
Trojan.Win32.Agent.apag [Kaspersky Lab]84
Trojan.Win32.Small [Ikarus]73
Mal/FakeAV-S [Sophos]70
Win-Trojan/Xema.variant [AhnLab]63
W32.Stration@mm [Symantec]48
Mal/EncPk-GB [Sophos]45
Trojan-Clicker.Win32.Agent.bqs [Kaspersky Lab]45
DNSChanger.f.gen.a [McAfee]40
Mal/TDSS-A [Sophos]40
Rootkit.Win32.Agent [Ikarus]39
Trojan.Win32.InternetAntivirus [Ikarus]39
Win-Trojan/Dnschanger.4278 [AhnLab]39
DNSChanger.r [McAfee]34
Trojan.Small!sd6 [PC Tools]34
Virus.Win32.Fasec [Ikarus]33
Packed.Win32.Tdss.f [Kaspersky Lab]32
Trojan.Vundo [Symantec]31
Rootkit.Win32.TDSS.eyj [Kaspersky Lab]30
Mal/EncPk-CZ [Sophos]29
Mal/WaledPak-D [Sophos]27
Packed.Win32.TDSS.y [Kaspersky Lab]27
Trojan-Clicker.Agent!sd6 [PC Tools]27
Trojan.Win32.Agent.asxa [Kaspersky Lab]26
Trojan.Win32.FakeSpyguard [Ikarus]25
Mal/TDSS-A, Mal/EncPk-CZ [Sophos]24
Trojan-Downloader.Win32.Agent.ahcg [Kaspersky Lab]24
Packed.Win32.Tdss.c [Kaspersky Lab]23
Packed.Win32.Tdss.w [Kaspersky Lab]23
Generic FakeAlert.k [McAfee]22
Packed.Win32.Tdss.a [Kaspersky Lab]22
Trojan.Zlob [Symantec]22
FakeAlert-SpywareGuard.gen.b [McAfee]21
Virus.Win32.Fabot [Ikarus]21
Packed.Win32.Tdss [Ikarus]18
Trojan.TDss.1 [Ikarus]18
Backdoor.Win32.TDSS [Ikarus]17
Trojan.Win32.Small.ymw [Kaspersky Lab]16
Mal/Alureon-C [Sophos]14
Mal/Alureon-C, Mal/Alureon-B, Mal/FakeAV-S [Sophos]13
Mal/Alureon-C, Mal/Alureon-B, Mal/FakeAV-S, Mal/FakeVirPk-A [Sophos]13
Adware.Lop [Symantec]12
Mal/FakeVirPk-A [Sophos]12
Mal/TDSSPack-A [Sophos]11
Trojan-Dropper.Agent [Ikarus]11
Generic FakeAlert.h [McAfee]10
Mal/Alureon-C, Mal/FakeVirPk-A [Sophos]10
Packed.Win32.Krap.d [Kaspersky Lab]10
Trojan.Crypt [Ikarus]10
Trojan.SillyWorm [PC Tools]10
Trojan:Win32/Alureon.gen!O [Microsoft]10
Trojan-Downloader.Agent!sd6 [PC Tools]10
Worm.Win32.AutoTDSS [Ikarus]10
FakeAlert-AG.gen.a [McAfee]9
Packed.Win32.Krap [Ikarus]9
Rootkit.Win32.Agent.cgo [Kaspersky Lab]9
Troj/Agent-HIG [Sophos]9
Trojan.Win32.Tdss [Ikarus]9
Trojan.Win32.Tdss.aiil [Kaspersky Lab]9
HeurEngine.MaliciousPacker [PC Tools]8
Mal/EncPk-EQ [Sophos]8
New Malware.ex [McAfee]8
Packed.Win32.Tdss.m [Kaspersky Lab]8
Backdoor.Tidserv!sd6 [PC Tools]7
Backdoor.Win32.UltimateDefender.gen [Kaspersky Lab]7
Downloader-BON [McAfee]7
FakeAlert-DA [McAfee]7
Mal/EncPk-IF [Sophos]7
Trojan.TDss [Ikarus]7
Trojan.Win32.Small.ymw [Ikarus]7
Vundo [McAfee]7
Backdoor.Trojan [Symantec]6
DNSChanger.f.gen.b [McAfee]6
Mal/FakeVirPk-A, Mal/EncPk-CZ [Sophos]6
Mal/TDSSPack-E [Sophos]6
Mal/TDSSPack-Q [Sophos]6
Packed.Win32.Tdss.b [Kaspersky Lab]6
Rootkit.Agent!sd6 [PC Tools]6

Trojan:Win32/Alureon.gen!J [Microsoft] has the following possible countries of origin:
OriginNumber of Incidents
Russian Federation10
Ukraine3
Austria1

Trojan:Win32/Alureon.gen!J [Microsoft] is known to be created as:
%ProgramFiles%\adult tube xxx codec\antivirus\lol.exe
%ProgramFiles%\adult tube xxx codec\antivirus\service.exe
%System%\1.exe
%System%\msihost.exe
%Temp%\090614-a-34.exe
%Temp%\aehe.exe
%Temp%\alfadvd.exe
%Temp%\alfaplay.exe
%Temp%\besthd.exe
%Temp%\betacoder.exe
%Temp%\cb_v.exe
%Temp%\clxdiv.exe
%Temp%\digvid.exe
%Temp%\dvdtool.exe
%Temp%\dvidpl.exe
%Temp%\file.exe
%Temp%\gammadivx.exe
%Temp%\gammadvd.exe
%Temp%\gammahd.exe
%Temp%\gammavid.exe
%Temp%\gammaxvid.exe
%Temp%\hdextra.exe
%Temp%\hdtvcodec.exe
%Temp%\htdivx.exe
%Temp%\htxvid.exe
%Temp%\idea35521.exe
%Temp%\jah35651.exe
%Temp%\l.exe
%Temp%\ma_r.exe
%Temp%\ma_v.exe
%Temp%\mediacodec.exe
%Temp%\muvexer.exe
%Temp%\omegabr.exe
%Temp%\playcoder.exe
%Temp%\tnkdvd.exe
%Temp%\ultrathd.exe
%Temp%\vidcoder.exe
%UserProfile%\azubxfbq.exe
%UserProfile%\kqspipgegv.exe
%UserProfile%\xcebub.exe
%Windir%\codecbeta.exe
%Windir%\file.exe
%Windir%\loadernew.exe
c:\resycled\boot.com
c:\resycled\ntldr.com
Notes:
  • %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
  • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
  • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
  • %UserProfile% is a variable that specifies the current user's profile folder. By default, this is C:\Documents and Settings\[UserName] (Windows NT/2000/XP).
  • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.