Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Alureon.CT aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2255
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2269
Trojan:Win32/Alureon.CT Microsoft Trojan.DownLoad1.42321
Trojan:Win32/Alureon.CT Microsoft Trojan.Packed.2936
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2257
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.based.3
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.based.1
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.550
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.565
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.585
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2222
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2242
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2193
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2163
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2189
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2197
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2167
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2194
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2240
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.4059
Trojan:Win32/Alureon.CT Microsoft Trojan.MulDrop1.41191
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3940
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3891
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.2459
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.based.7
Trojan:Win32/Alureon.CT Microsoft Trojan.Packed.20764
Trojan:Win32/Alureon.CT Microsoft Trojan.Packed.20789
Trojan:Win32/Alureon.CT Microsoft Trojan.Packed.20773
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3412
Trojan:Win32/Alureon.CT Microsoft Trojan.DownLoader1.28765
Trojan:Win32/Alureon.CT Microsoft Trojan.Packed.20457
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3356
Trojan:Win32/Alureon.CT Microsoft Trojan.Packed.21033
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3392
Trojan:Win32/Alureon.CT Microsoft Trojan.Packed.20737
Trojan:Win32/Alureon.CT Microsoft Trojan.MulDrop1.52258
Trojan:Win32/Alureon.CT Microsoft Trojan.DownLoader1.26721
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3359
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3357
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3384
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.1050
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3414
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3408
Trojan:Win32/Alureon.CT Microsoft Trojan.DownLoader1.28505
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3371
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3383
Trojan:Win32/Alureon.CT Microsoft BackDoor.IRC.Sdbot.15342
Trojan:Win32/Alureon.CT Microsoft Trojan.DownLoader1.28726
Trojan:Win32/Alureon.CT Microsoft Trojan.DownLoader1.27050
Trojan:Win32/Alureon.CT Microsoft BackDoor.Tdss.3372

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.