Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Alureon.gen!U aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.based.1
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.438
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.403
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.507
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Geyekr
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.446
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.origin
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.298
Trojan:Win32/Alureon.gen!U Microsoft Trojan.Packed.2479
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.321
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.490
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.489
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.491
Trojan:Win32/Alureon.gen!U Microsoft Trojan.Packed.2788
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.369
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.268
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Geyekr.4
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.262
Trojan:Win32/Alureon.gen!U Microsoft Trojan.DownLoad.38461
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.BotNet.109
Trojan:Win32/Alureon.gen!U Microsoft Trojan.Packed.2936
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.445
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.496
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.494
Trojan:Win32/Alureon.gen!U Microsoft Trojan.NtRootKit.2997
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.214
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.310
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.540
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.430
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.372
Trojan:Win32/Alureon.gen!U Microsoft Trojan.Siggen.5068
Trojan:Win32/Alureon.gen!U Microsoft Trojan.Packed.365
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.419
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.370
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.269
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.428
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.627
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.700
Trojan:Win32/Alureon.gen!U Microsoft Trojan.Siggen.23634
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.673
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.939
Trojan:Win32/Alureon.gen!U Microsoft BackDoor.Tdss.719

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.