Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Trenk!rts aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.740
Backdoor:Win32/Trenk!rts Microsoft Trojan.Winlock.16
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.15891
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.5013
Backdoor:Win32/Trenk!rts Microsoft Trojan.PWS.Buzers
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.817
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.54
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.52
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.1029
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.12389
Backdoor:Win32/Trenk!rts Microsoft Trojan.DownLoad.21
Backdoor:Win32/Trenk!rts Microsoft Tool.BrutusPWS
Backdoor:Win32/Trenk!rts Microsoft Win32.HLLO.Blop
Backdoor:Win32/Trenk!rts Microsoft Trojan.DownLoad.13587
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.95
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.8
Backdoor:Win32/Trenk!rts Microsoft Trojan.Interlac.10
Backdoor:Win32/Trenk!rts Microsoft Adware.Hotbar.224
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.31991
Backdoor:Win32/Trenk!rts Microsoft BackDoor.PSClient
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost
Backdoor:Win32/Trenk!rts Microsoft Trojan.Inject.5089
Backdoor:Win32/Trenk!rts Microsoft Win32.IRC.Bot.87
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.2990
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop1.4753
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.515
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.15888
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.637
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.76
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.11197
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.981
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.41
Backdoor:Win32/Trenk!rts Microsoft Trojan.PWS.Gadu
Backdoor:Win32/Trenk!rts Microsoft Trojan.Siggen.3393
Backdoor:Win32/Trenk!rts Microsoft Trojan.MulDrop.14958
Backdoor:Win32/Trenk!rts Microsoft Trojan.Siggen.58905
Backdoor:Win32/Trenk!rts Microsoft Trojan.Siggen.57196
Backdoor:Win32/Trenk!rts Microsoft BackDoor.ProRat.353
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Poison.1021
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.966
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.963
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.979
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.976
Backdoor:Win32/Trenk!rts Microsoft Trojan.DownLoad1.40755
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.105
Backdoor:Win32/Trenk!rts Microsoft Trojan.DownLoad.41539
Backdoor:Win32/Trenk!rts Microsoft Win32.HLLW.Autoruner.15773
Backdoor:Win32/Trenk!rts Microsoft Win32.HLLW.Autoruner.15766
Backdoor:Win32/Trenk!rts Microsoft Program.RemoteAdmin.75
Backdoor:Win32/Trenk!rts Microsoft BackDoor.Bifrost.906

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.