Threat Search: 

ThreatExpert's Statistics for Virus.Win32.Agent [Ikarus]:

Virus.Win32.Agent [Ikarus] is also known as:
Threat AliasNumber of Incidents
Infostealer.Gampass [Symantec]339
Trojan-Spy.Gampass!sd6 [PC Tools]305
PWS-Mmorpg.gen [McAfee]279
Win-Trojan/OnlineGameHack.14423 [AhnLab]215
Mal/Generic-A [Sophos]209
Trojan-GameThief.Win32.Magania.axbt [Kaspersky Lab]200
Generic Downloader.x [McAfee]196
Downloader [Symantec]181
Trojan-Downloader.Win32.Adload.cgs [Kaspersky Lab]156
Trojan-Downloader.Adload!sd6 [PC Tools]130
Win-Trojan/Adload.32768.T [AhnLab]117
Trojan-GameThief.Win32.Magania.axbn [Kaspersky Lab]76
Infostealer [Symantec]50
Mal/Inet-Fam [Sophos]41
Trojan-Downloader.Adload.JM [PC Tools]39
Generic.dx [McAfee]24
Win-Trojan/OnlineGameHack.6624 [AhnLab]16
Mal/Dropper-AE [Sophos]13
Trojan Horse [Symantec]11
Mal/EncPk-AF [Sophos]8
Trojan.Dropper [Symantec]8
Win-Trojan/Xema.variant [AhnLab]8
PE_WERLY.A [Trend Micro]7
Virus.Win32.Agent.cg [Kaspersky Lab]7
Virus:Win32/Lywer.A [Microsoft]7
W32.Werly.A [Symantec]7
W32/Werly [McAfee]7
Generic PWS.y [McAfee]6
Trojan.Generic [PC Tools]6
TrojanDownloader:Win32/Troxen!rts [Microsoft]6
Virus.Win32.Agent.dp [Kaspersky Lab]6
W32/Fujacks.ay [McAfee]6
BackDoor-DRV.gen.c [McAfee]5
PE_CORELINK.C-1 [Trend Micro]5
Trojan.Generic [Ikarus]5
Trojan.Win32.Chifrax.a [Kaspersky Lab]5
Trojan-PSW.Generic [PC Tools]5
Trojan-Spy.Win32.Delf.dja [Kaspersky Lab]5
Virus.Win32.Alman.b [Kaspersky Lab]5
Virus:Win32/Almanahe.B [Microsoft]5
W32.Almanahe.B!inf [Symantec]5
W32/Almanahe.c [McAfee]5
W32/Alman-C [Sophos]5
Win32/Alman.C [AhnLab]5
PWS:Win32/Stealer.M [Microsoft]4
Trojan.Win32.IMTheft.a [Kaspersky Lab]4
Trojan-Downloader.Win32.Agent.boxz [Kaspersky Lab]4
Trojan-Downloader.Win32.Banload.yrp [Kaspersky Lab]4
Trojan-Spy.Win32.Delf.elp [Kaspersky Lab]4
Win-Trojan/Agent.48875 [AhnLab]4
Mal/PWS-Fam [Sophos]3
Virus:Win32/Smee.A [Microsoft]3
W32.Fujacks.CB [Symantec]3
W32/Caveduck.a [McAfee]3
W32/Vetor-I [Sophos]3
Adclicker-GW [McAfee]2
Application.Ardamax_Keylogger [PC Tools]2
Backdoor.Win32.BlackHole.2005.a [Kaspersky Lab]2
Generic Dropper!rz [McAfee]2
Generic.ca [McAfee]2
Mal/EncPk-CR [Sophos]2
Mal/Packer [Sophos]2
Suspicious.MH690 [Symantec]2
Troj/Dropr-K [Sophos]2
Trojan:Win32/Meredrop [Microsoft]2
Trojan-Spy.Delf.dja [PC Tools]2
Trojan-Spy.Win32.Delf.ebj [Kaspersky Lab]2
Virus.Win32.Agent.cb [Kaspersky Lab]2
W32.SillyFDC [Symantec]2
Worm:Win32/Nuj.A [Microsoft]2
Backdoor.Bifrose.BJC [PC Tools]1
Backdoor.BlackHole!sd5 [PC Tools]1
Backdoor.GirlinRed [PC Tools]1
Backdoor.Singu [Symantec]1
Backdoor.Win32.Bifrose.bwt [Kaspersky Lab]1
Backdoor.Win32.Hupigon.fktn [Kaspersky Lab]1
Backdoor.Win32.Hupigon.hijd [Kaspersky Lab]1
Backdoor:Win32/Bifrose [Microsoft]1
Backdoor:Win32/Blackhole.S [Microsoft]1
BackDoor-AWQ.b [McAfee]1
BackDoor-AWQ.b!g [McAfee]1
Dropper/Agent.11776.S [AhnLab]1
Dropper/Agent.69632.AL [AhnLab]1
Dropper/Downloader.69632.O [AhnLab]1
Exploit:Win32/Pidief.C [Microsoft]1
Generic Dropper [McAfee]1
Generic PWS.ak [McAfee]1
Generic.dx!bg [McAfee]1
Mal/Behav-043, Mal/Behav-127 [Sophos]1
Mal/Behav-053 [Sophos]1
Mal/Behav-106 [Sophos]1
Mal/Bifrose-S [Sophos]1
Mal/Emogen-E, Mal/Behav-216 [Sophos]1
Mal/HckPk-A, Mal/EncPk-CR [Sophos]1
Net-Worm.Fujacks [PC Tools]1
New Malware.br [McAfee]1
Packed.Win32.Krap.b [Kaspersky Lab]1
Patched-RarSFX [McAfee]1
PE_FIDAMEG.A [Trend Micro]1
PE_JEEFO.C [Trend Micro]1

Virus.Win32.Agent [Ikarus] has the following possible countries of origin:
OriginNumber of Incidents
China50
Poland17
Italy7
United Kingdom5
Russian Federation3
Brazil2
France2
Finland1
Israel1
Republic of Korea1
Sweden1

Virus.Win32.Agent [Ikarus] is known to be created as:
%DesktopDir%\user.exe
%ProgramFiles%\1k66434m4jeq.exe
%ProgramFiles%\38gqm7m7g.exe.com
%ProgramFiles%\3mjj3ia\rqdvle0.exe
%ProgramFiles%\3q51k5lq\474wzme1.exe
%ProgramFiles%\50qmq.exe
%ProgramFiles%\5cfbkt53\vgci1ffzl.exe
%ProgramFiles%\5cfbkt53\vgci1ffzl.exe.com
%ProgramFiles%\71qvbzg.exe.com
%ProgramFiles%\9j89e7y.exe
%ProgramFiles%\b8vcovhc3k\4bprp3g2h7.exe
%ProgramFiles%\b8vcovhc3k\4bprp3g2h7.exe.exe
%ProgramFiles%\c93o7n44j\73thwotv6k.exe
%ProgramFiles%\c93o7n44j\73thwotv6k.exe.exe
%ProgramFiles%\ccfiv95zhi.exe
%ProgramFiles%\clbet4m12\9rssoqe75c.exe
%ProgramFiles%\dfs2i.exe
%ProgramFiles%\enznh4.exe
%ProgramFiles%\ghnyx\ljffy.exe
%ProgramFiles%\gzul90.exe.exe
%ProgramFiles%\h3kqk5ce.exe.com
%ProgramFiles%\internet explorer\iedw.exe.com
%ProgramFiles%\internet explorer\iedw.exe.exe
%ProgramFiles%\internet explorer\iexplore.exe.com
%ProgramFiles%\internet explorer\iexplore.exe.exe
%ProgramFiles%\io8oyqvba4\s3htcnh98rz.exe
%ProgramFiles%\io8oyqvba4\s3htcnh98rz.exe.com
%ProgramFiles%\ix4ehodoj6.exe.com
%ProgramFiles%\j565jipo5j\90a961acgu.exe
%ProgramFiles%\k0q7g0kntwz.exe.exe
%ProgramFiles%\messenger\msmsgs.exe.com
%ProgramFiles%\messenger\msmsgs.exe.exe
%ProgramFiles%\mi0qrep3h6\cmu3aavoxp.exe
%ProgramFiles%\msn\msncorefiles\install\msnsusii.exe.com
%ProgramFiles%\msn\msncorefiles\install\msnsusii.exe.exe
%ProgramFiles%\msn\msnia\msniasvc.exe.com
%ProgramFiles%\msn\msnia\msniasvc.exe.exe
%ProgramFiles%\msn\msninstaller\msninst.exe.com
%ProgramFiles%\msn\msninstaller\msninst.exe.exe
%ProgramFiles%\netmeeting\cb32.exe.com
%ProgramFiles%\netmeeting\cb32.exe.exe
%ProgramFiles%\o69r5e\cga06n.exe
%ProgramFiles%\o69r5e\cga06n.exe.com
%ProgramFiles%\outlook express\msimn.exe.com
%ProgramFiles%\outlook express\msimn.exe.exe
%ProgramFiles%\pbyn6ve.exe
%ProgramFiles%\qqwqlji.exe.exe
%ProgramFiles%\ryfmw\2vti4.exe
%ProgramFiles%\s1limibdtz.exe
%ProgramFiles%\s1xshtb\ffy6st60q3.exe
%ProgramFiles%\smckh\is5q8.exe
%ProgramFiles%\softmini.exe
%ProgramFiles%\spu27ov6g1i\gtppkhymsnw.exe
%ProgramFiles%\spu27ov6g1i\gtppkhymsnw.exe.exe
%ProgramFiles%\sqo789wx6.exe.exe
%ProgramFiles%\stormii\stormsrv.exe
%ProgramFiles%\uixy8stw9cb\kmh209zl1q8e.exe
%ProgramFiles%\uxua4z98.exe
%ProgramFiles%\v91pg4zuq6k\0z3bot03w6x.exe
%ProgramFiles%\v91pg4zuq6k\0z3bot03w6x.exe.com
%ProgramFiles%\web publish\wpwiz.exe.com
%ProgramFiles%\web publish\wpwiz.exe.exe
%ProgramFiles%\windows media player\migrate.exe.com
%ProgramFiles%\windows media player\migrate.exe.exe
%ProgramFiles%\windows nt\accessories\wordpad.exe.com
%ProgramFiles%\windows nt\accessories\wordpad.exe.exe
%ProgramFiles%\windows nt\dialer.exe.com
%ProgramFiles%\windows nt\dialer.exe.exe
%ProgramFiles%\winpcap\rpcapd.exe.com
%ProgramFiles%\winpcap\rpcapd.exe.exe
%ProgramFiles%\xv3p0s\lyx1go.exe
%ProgramFiles%\yeqni\mjlkuo.exe
%ProgramFiles%\yt7cp0izlrw.exe
%ProgramFiles%\zofah1livwvi\ns9t0dkfpm12.exe
%System%\_temp.exe
%System%\1025.exe
%System%\1028.exe
%System%\1031.exe
%System%\1033.exe
%System%\1037.exe
%System%\1041.exe
%System%\1042.exe
%System%\1054.exe
%System%\2052.exe
%System%\3076.exe
%System%\3com_dmi.exe
%System%\a1a6bc2e.dll
%System%\catroot.exe
%System%\catroot2.exe
%System%\cc80f0b4.dll
%System%\com.exe
%System%\config.exe
%System%\conquer.exe
%System%\dhcp.exe
%System%\directx.exe
%System%\dllcache.exe
%System%\drivers.exe
%System%\drivers\winyyy.sys
%System%\eraleuh.exe
%System%\export.exe
Notes:
  • %DesktopDir% is a variable that refers to the file system directory used to physically store file objects on the desktop. A typical path is C:\Documents and Settings\[UserName]\Desktop.
  • %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
  • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).