Trojan:DOS/Alureon.A
Windows Defender detects and removes this threat.
This threat is part of the Alureon malware family. It runs a file installed by other Alureon malware.
DOS/Alureon
Win32/Alureon
Windows Defender detects this threat.
This family of data-stealing trojans can give a malicious hacker access to collect confidential information stored in your PC, such as your user names, passwords, and credit card data.
They can also send malicious data to your PC and corrupt some driver files, making them unusable.
Win64/Alureon
Microsoft security software detects this threat.
This family of data-stealing trojans can give a malicious hacker access to collect confidential information stored in your PC, such as your user names, passwords, and credit card data.
They can also send malicious data to your PC and corrupt some driver files, making them unusable.
WinNT/Alureon
Trojan:DOS/Alureon.AB
Windows Defender detects and removes this threat.
Trojan:DOS/Alureon.AB is a part of Win32/Alureon - a family of data-stealing malware. Alureon steals confidential information from your computer, such as user names, passwords, and credit card data. Win32/Alureon may also allow an attacker to transmit malicious data to your computer.
This particular variant infects the Master Boot Record (MBR).
Trojan:Win32/Alureon.gen!AB
Trojan:Win32/Alureon.gen!AB is the generic detection for a member of the Win32/Alureon family. It drops another malware, tries to delete the Hosts file, and tries to create a virtual file system (VFS). It may also connect to certain servers.
Trojan:Win32/Alureon.GI
Trojan:Win32/Alureon.GJ
Trojan:Win32/Alureon.GK
Trojan:Win32/Alureon.GL
Virus:Win32/Alureon.gen!D
Windows Defender detects and removes this threat.
This virus is a component of Win32/Alureon - a family of data-stealing malware. They allow a hacker to collect confidential information such as your user names, passwords, and credit card data.
Trojan:Win32/Alureon.EP
Trojan:Win32/Alureon.EP is component of Win32/Alureon - a family of data-stealing trojans. Trojan:Win32/Alureon.EP is the detection for a component that drops and loads a driver component.
Virus:Win32/Alureon.gen!B
Microsoft security software detects this threat.
This virus is part of the Win32/Alureon family of data-stealing malware. They can give a malicious hacker access to steal your confidential information such as your user names, passwords, and credit card data.
Trojan:DOS/Alureon.E
Windows Defender detects and removes this threat.
The threat is a member of the Alureon family of data-stealing trojans. These trojans can give a malicious hacker access to your PC to steal your confidential information, such as your user names, passwords, and credit card data.
See the Alureon and DOS/Alureon family descriptionfor more information.
Trojan:DOS/Alureon.K
Windows Defender detects this threat.
The threat is a member of the Alureon family of data-stealing trojans. These trojans allow a malicious hacker to get confidential information such as your user names, passwords, and credit card data.
For more information on the Alureon family, see the Alureon family description and the DOS/Alureon description.
Trojan:Win32/Alureon.GQ
Windows Defender detects and removes this threat.
Trojan:Win32/Alureon.GQ is a member of the Win32/Alureon family of malware - a family of data-stealing malware. These trojans allow an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information from your computer, such as user names, passwords, and credit card data.
The trojan is also used to generate traffic to specific URLs.
Win32/Alureon can also allow an attacker to transmit malicious data to your computer. It might modify DNS settings on your computer to enable the attacker to perform these tasks.
The Domain Name System (DNS) is used (among other things) to map domain names to IP addresses - that is, to map human-readable domain names to machine-readable IP addresses. When you attempt to visit a particular URL, a browser uses DNS servers to find the correct IP address of the requested domain. When you are directed to a malicious server that is not part of the authoritative Domain Name System, an attacker can provide incorrect IP addresses at their choice to map to particular domain names, thus directing you to possibly bogus or malicious sites without your knowledge.
You might need to reconfigure DNS settings after the trojan is removed from your computer. See the "What to do now" section below for advice on how to do this.
Trojan:DOS/Alureon.M
Windows Defender detects and removes this threat.
The threat is a member of the Alureon family of data-stealing trojans. These trojans allow a malicious hacker to get confidential information such as your user names, passwords, and credit card data.
For more information on the Alureon family, see the Alureon family description and the DOS/Alureon description.
Trojan:DOS/Alureon.J
Windows Defender detects and removes this threat.
The threat is a member of the Alureon family of data-stealing trojans. These trojans allow a malicious hacker to get confidential information such as your user names, passwords, and credit card data.
For more information on the Alureon family, see the Alureon family description and the DOS/Alureon description.
Trojan:Win32/Alureon.gen!AD
Trojan:Win32/Alureon.gen!AD is the generic detection for variants of the Win32/Alureon family. This malware can execute in 64-bit versions of Windows and uses exploits to install other Alureon components. It communicates with a remote server to report its installation and to download updates of the malware. This variant uses advanced stealth techniques such as modifying the Master Boot Record (MBR) to hinder detection and removal of its various components.