Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Aegrus aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.11557
Trojan:Win32/Aegrus Microsoft Trojan.PWS.Banker.4531
Trojan:Win32/Aegrus Microsoft Trojan.MulDrop.9885
Trojan:Win32/Aegrus Microsoft Adware.Letscool
Trojan:Win32/Aegrus Microsoft Trojan.Packed.38
Trojan:Win32/Aegrus Microsoft Adware.Dudu
Trojan:Win32/Aegrus Microsoft Trojan.MulDrop.4397
Trojan:Win32/Aegrus Microsoft Trojan.PWS.Banker.22734
Trojan:Win32/Aegrus Microsoft Trojan.PWS.Banker.6956
Trojan:Win32/Aegrus Microsoft Trojan.StartPage.678
Trojan:Win32/Aegrus Microsoft BackDoor.Hidden
Trojan:Win32/Aegrus Microsoft BackDoor.Generic.1470
Trojan:Win32/Aegrus Microsoft Trojan.Mezzia.69
Trojan:Win32/Aegrus Microsoft Trojan.Fakealert.208
Trojan:Win32/Aegrus Microsoft BackDoor.Uragan
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.7497
Trojan:Win32/Aegrus Microsoft BackDoor.IRC.Sdbot.500
Trojan:Win32/Aegrus Microsoft BackDoor.Outbreak.23
Trojan:Win32/Aegrus Microsoft Trojan.MulDrop.4306
Trojan:Win32/Aegrus Microsoft Flooder.Lanxu
Trojan:Win32/Aegrus Microsoft Adware.DollarRevenue
Trojan:Win32/Aegrus Microsoft BackDoor.Pigeon.11870
Trojan:Win32/Aegrus Microsoft Trojan.MulDrop.8064
Trojan:Win32/Aegrus Microsoft Trojan.PWS.Wool
Trojan:Win32/Aegrus Microsoft Tool.DialupPass
Trojan:Win32/Aegrus Microsoft Dialer.Fairtale
Trojan:Win32/Aegrus Microsoft BackDoor.Generic.1502
Trojan:Win32/Aegrus Microsoft BackDoor.Generic.1324
Trojan:Win32/Aegrus Microsoft BackDoor.IRC.Sdbot.1916
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.15755
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.32504
Trojan:Win32/Aegrus Microsoft Dialer.Questo
Trojan:Win32/Aegrus Microsoft Trojan.MulDrop.956
Trojan:Win32/Aegrus Microsoft Trojan.Proxy.640
Trojan:Win32/Aegrus Microsoft Trojan.ActualSpy
Trojan:Win32/Aegrus Microsoft Adware.Newcell
Trojan:Win32/Aegrus Microsoft BackDoor.IRC.Juden
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.17681
Trojan:Win32/Aegrus Microsoft Adware.Msearch
Trojan:Win32/Aegrus Microsoft Exploit.DCom.85
Trojan:Win32/Aegrus Microsoft BackDoor.Gament
Trojan:Win32/Aegrus Microsoft DownLoader.Generator
Trojan:Win32/Aegrus Microsoft Trojan.PWS.Banker.9688
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.17249
Trojan:Win32/Aegrus Microsoft Trojan.Packed.120
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.33888
Trojan:Win32/Aegrus Microsoft Trojan.DownLoader.33244
Trojan:Win32/Aegrus Microsoft Trojan.PWS.Marcos
Trojan:Win32/Aegrus Microsoft Trojan.PWS.LDPinch.2317
Trojan:Win32/Aegrus Microsoft Trojan.PWS.Banker.7026

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.