Threat Search: 

ThreatExpert's Statistics for Virus.Win32.OnLineGames [Ikarus]:

Virus.Win32.OnLineGames [Ikarus] is also known as:
Threat AliasNumber of Incidents
Infostealer.Onlinegame [Symantec]563
Trojan-PSW.Win32.QQPass.hwq [Kaspersky Lab]238
Trojan-Spy.Onlinegame!sd6 [PC Tools]210
PWS:Win32/Lolyda.AG [Microsoft]182
Mal/Mdrop-B [Sophos]124
Generic PWS.y!s [McAfee]119
Mal/Inet-Fam [Sophos]119
Mal/Generic-A [Sophos]117
Infostealer.Gampass [Symantec]67
Trojan.Win32.Agent.bnxc [Kaspersky Lab]38
Generic.PWS.Games [Ikarus]36
Trojan.Win32.Agent.bqhc [Kaspersky Lab]35
Mal/Behav-010 [Sophos]34
Trojan-Dropper.Win32.Comotor [Ikarus]31
PWS-Mmorpg.gen [McAfee]29
PWS-Gamania.gen.l [McAfee]28
Infostealer.Lemir [Symantec]20
Win-Trojan/Agent.13312.KB [AhnLab]20
Mal/Comot-A [Sophos]17
PWS:Win32/Lolyda.AE [Microsoft]14
Troj/PSW-GO [Sophos]13
PWS:Win32/Mmosteal!rts [Microsoft]12
PWS-Mmorpg!k [McAfee]11
Trojan-GameThief.Win32.OnLineGames.blso [Kaspersky Lab]10
PWS-OnlineGames.ed [McAfee]8
Trojan-Spy.Gampass!sd6 [PC Tools]8
Trojan-Spy.Lemir!sd6 [PC Tools]8
Win-Trojan/Agent.53248.NW [AhnLab]8
Generic.dx [McAfee]7
Trojan Horse [Symantec]7
PWS:Win32/OnLineGames.ABK [Microsoft]6
Trojan-GameThief.Win32.OnLineGames.bkue [Kaspersky Lab]5
Trojan-PSW.Win32.Agent.mhd [Kaspersky Lab]5
Win-Trojan/Xema.variant [AhnLab]5
Mal/Dropper-O, Mal/Mdrop-B [Sophos]4
not-a-virus.Patch.IDM [Ikarus]4
PWS:Win32/Lolyda.AC [Microsoft]4
PWS-Mmorpg!r [McAfee]4
Trojan.Win32.Agent.bsfx [Kaspersky Lab]4
Trojan.Win32.Agent.butl [Kaspersky Lab]4
Trojan-GameThief.Win32.OnLineGames.blti [Kaspersky Lab]4
Trojan-GameThief.Win32.OnLineGames.bmcu [Kaspersky Lab]4
Trojan-GameThief.Win32.OnLineGames.uvrn [Kaspersky Lab]4
Trojan-GameThief.Win32.OnLineGames.uvro [Kaspersky Lab]4
Trojan-GameThief.Win32.OnLineGames.uwog [Kaspersky Lab]4
Trojan-GameThief.Win32.OnLineGames.vadb [Kaspersky Lab]4
Trojan-Spy.Win32.BHO.as [Kaspersky Lab]4
Win-Trojan/Malware.30720 [AhnLab]4
Win-Trojan/OnlineGameHack.30720.EW [AhnLab]4
Win-Trojan/OnlineGameHack.34816.BT [AhnLab]4
Win-Trojan/OnlineGameHack.44032.AF [AhnLab]4
PWS:Win32/Lolyda.AF [Microsoft]3
Trojan-GameThief.Win32.OnLineGames.uuyl [Kaspersky Lab]3
Win32/Agent.worm.143872 [AhnLab]3
Generic PWS.y!cn [McAfee]2
Mal/PWSHook-A [Sophos]2
Mal/UnkPack-Fam [Sophos]2
PWS:Win32/Zosernam.B [Microsoft]2
PWS-Gamania.gen.dll [McAfee]2
PWS-Manresoz [McAfee]2
Suspicious.MH690 [Symantec]2
Trojan-Dropper.Win32.Small.cwc [Kaspersky Lab]2
Trojan-GameThief.Win32.OnLineGames.bkyc [Kaspersky Lab]2
Trojan-GameThief.Win32.OnLineGames.uubc [Kaspersky Lab]2
Trojan-GameThief.Win32.OnLineGames.uusi [Kaspersky Lab]2
Trojan-GameThief.Win32.OnLineGames.uusj [Kaspersky Lab]2
Trojan-GameThief.Win32.OnLineGames.uuzc [Kaspersky Lab]2
Trojan-GameThief.Win32.OnLineGames.vcwa [Kaspersky Lab]2
Win-Trojan/OnlineGameHack.16160.O [AhnLab]2
Win-Trojan/OnlineGameHack.23552.BI [AhnLab]2
Win-Trojan/OnlineGameHack.28672.VX [AhnLab]2
Win-Trojan/OnlineGameHack.34304.EK [AhnLab]2
Backdoor.Trojan [PC Tools]1
Backdoor.Trojan [Symantec]1
Dropper/OnlineGameHack.13824.AE [AhnLab]1
Dropper/OnlineGameHack.15648 [AhnLab]1
Dropper/OnlineGameHack.16160.B [AhnLab]1
Generic PWS.y!ej [McAfee]1
Mal/Emogen-Y, Mal/Behav-027 [Sophos]1
Mal/GamDam-B [Sophos]1
Mal/ProcInj-Fam [Sophos]1
Mal/PWS-Fam [Sophos]1
New Malware.aj [McAfee]1
not-a-virus.Patch.UnREal [Ikarus]1
PWS.Win32 [Ikarus]1
PWS:Win32/Lmir.S [Microsoft]1
PWS:Win32/Lolyda.AD [Microsoft]1
PWS:Win32/Mapdimp.gen [Microsoft]1
PWS:Win32/OnLineGames.DK [Microsoft]1
PWS:Win32/OnLineGames.ZY [Microsoft]1
PWS-Mmorpg!cs [McAfee]1
PWS-Mmorpg!dp [McAfee]1
Trojan.Win32.Agent.anbw [Kaspersky Lab]1
Trojan.Win32.Agent.bnrk [Kaspersky Lab]1
Trojan.Win32.Agent.bpwp [Kaspersky Lab]1
Trojan.Win32.Agent.bsyy [Kaspersky Lab]1
Trojan.Win32.Agent.btdr [Kaspersky Lab]1
Trojan.Win32.Agent.btnh [Kaspersky Lab]1
Trojan.Win32.Agent.btra [Kaspersky Lab]1
Trojan.Win32.Agent.busj [Kaspersky Lab]1

Virus.Win32.OnLineGames [Ikarus] has the following possible countries of origin:
OriginNumber of Incidents
China193
United Kingdom9
Bulgaria1

Virus.Win32.OnLineGames [Ikarus] is known to be created as:
%FontsDir%\gth43580.dll
%FontsDir%\gth61455.dll
%FontsDir%\gth62450.dll
%FontsDir%\gth62455.dll
%FontsDir%\gth66455.dll
%FontsDir%\gth67455.dll
%FontsDir%\gth68450.dll
%FontsDir%\gth68455.dll
%FontsDir%\gth69450.dll
%FontsDir%\gth69455.dll
%FontsDir%\gth70455.dll
%FontsDir%\gth72455.dll
%FontsDir%\gth73450.dll
%FontsDir%\gth73456.dll
%FontsDir%\gth75455.dll
%FontsDir%\gth75458.dll
%FontsDir%\gth80450.dll
%FontsDir%\gth82455.dll
%FontsDir%\gth83450.dll
%FontsDir%\gth92451.dll
%FontsDir%\gth92455.dll
%FontsDir%\gth97450.dll
%System%\malware\malware\2df9fcb.dll
%System%\y.exe
%Temp%\a\090312-a-26.exe
%Temp%\patch.exe
Notes:
  • %FontsDir% is a variable that refers to a virtual folder containing fonts. A typical path is C:\Windows\Fonts.
  • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
  • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).