Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Redirect aliases:

Name Vendor Dr.Web classification name
TROJ_KEYHOST.D Trend Micro Trojan.Redirect
application Adware-PopMonster McAfee Trojan.Redirect
not-a-virus:AdWare.Win32.BiSpy.l Kaspersky Trojan.Redirect
Trojan-Clicker.Win32.Iedriver.b Kaspersky Trojan.Redirect
Trojan.Clicker.Iedriver.B BitDefender Trojan.Redirect
TROJ_Generic Trend Micro Trojan.Redirect
Adware-PopMonster McAfee Trojan.Redirect
Clicker.NA AVG Trojan.Redirect
Trojan-Clicker.Win32.Iedriver.a Kaspersky Trojan.Redirect
Trojan.StartPage.AKU BitDefender Trojan.Redirect
TR/POPMON.A4 Avira Trojan.Redirect
not-a-virus:AdWare.Win32.Atelys.a Kaspersky Trojan.Redirect
Generic2.QYI AVG Trojan.Redirect
AdClicker-EZ McAfee Trojan.Redirect
Win32/Aegrus Microsoft Trojan.Redirect
Win32/Jraun Microsoft Trojan.Redirect
Trojan-Spy.Win32.Newrok.b Kaspersky Trojan.Redirect
Trojan.StartPage.80 (paranoid heuristics VirusBlokAda Trojan.Redirect
Generic.DTE AVG Trojan.Redirect
Trojan.Spy.Newrok.B BitDefender Trojan.Redirect
Clicker.FRW AVG Trojan.Redirect
not-a-virus:AdWare.Win32.BiSpy.j Kaspersky Trojan.Redirect
AdWare.Win32.BiSpy.j VirusBlokAda Trojan.Redirect
Generic.DSY AVG Trojan.Redirect
Win32/My247eShopper Microsoft Trojan.Redirect
Trojan.StartPage.80 VirusBlokAda Trojan.Redirect
Clicker.BFI AVG Trojan.Redirect
TROJ_CLICKER.EI Trend Micro Trojan.Redirect
Generic.DTC AVG Trojan.Redirect
Trojan.Keyhost.D BitDefender Trojan.Redirect
Trojan:Win32/Aegrus Microsoft Trojan.Redirect
Trojan.Win32.StartPage VirusBlokAda Trojan.Redirect
Spyware:Win32/C2Lop.B Microsoft Trojan.Redirect
not-a-virus:Downloader.Win32.Casino Kaspersky Trojan.Redirect
Downloader.Generic4.LCA AVG Trojan.Redirect
TrojanClicker:Win32/Delf Microsoft Trojan.Redirect

Trojan.Redirect in virus library:

Trojan.Redirect.101
Trojan.Redirect.106
Trojan.Redirect.107
Trojan.Redirect.110
Trojan.Redirect.114
Trojan.Redirect.134
Trojan.Redirect.137
Trojan.Redirect.138
Trojan.Redirect.140
Trojan.Redirect.144
Trojan.Redirect.145
Trojan.Redirect.147
Trojan.Redirect.152
Trojan.Redirect.154
Trojan.Redirect.157
Trojan.Redirect.160
Trojan.Redirect.162
Trojan.Redirect.165
Trojan.Redirect.167
Trojan.Redirect.170
Trojan.Redirect.171
Trojan.Redirect.172
Trojan.Redirect.173
Trojan.Redirect.175
Trojan.Redirect.176
Trojan.Redirect.179
Trojan.Redirect.180
Trojan.Redirect.185
Trojan.Redirect.191
Trojan.Redirect.230
Trojan.Redirect.248
Trojan.Redirect.255
Trojan.Redirect.29
Trojan.Redirect.38
Trojan.Redirect.41
Trojan.Redirect.43
Trojan.Redirect.48
Trojan.Redirect.52
Trojan.Redirect.53
Trojan.Redirect.54
Trojan.Redirect.56
Trojan.Redirect.61
Trojan.Redirect.68
Trojan.Redirect.69
Trojan.Redirect.73
Trojan.Redirect.74
Trojan.Redirect.75
Trojan.Redirect.80
Trojan.Redirect.82
Trojan.Redirect.84

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.