Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Alureon.BK aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Alureon.BK Microsoft Trojan.Packed.2479
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.255
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.119
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.388
Trojan:Win32/Alureon.BK Microsoft Trojan.MulDrop.31052
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.253
Trojan:Win32/Alureon.BK Microsoft Trojan.Packed.637
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.282
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.380
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.based.1
Trojan:Win32/Alureon.BK Microsoft Trojan.Packed.2463
Trojan:Win32/Alureon.BK Microsoft Trojan.Packed.520
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.115
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.342
Trojan:Win32/Alureon.BK Microsoft Trojan.Spambot.4534
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.527
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.296
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.230
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.231
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.280
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.404
Trojan:Win32/Alureon.BK Microsoft Trojan.Packed.365
Trojan:Win32/Alureon.BK Microsoft Trojan.Packed.142
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.314
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.577
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.123
Trojan:Win32/Alureon.BK Microsoft Trojan.MulDrop.31604
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.423
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.427
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.426
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.424
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.232
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.528
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.315
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.317
Trojan:Win32/Alureon.BK Microsoft Trojan.Seneka.6
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.541
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.100
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.562
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.579
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.260
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.117
Trojan:Win32/Alureon.BK Microsoft Trojan.Siggen.5124
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.235
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.227
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.431
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.274
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.529
Trojan:Win32/Alureon.BK Microsoft BackDoor.Tdss.234
Trojan:Win32/Alureon.BK Microsoft Trojan.Packed.226

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.