Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Hacktool.Rootkit aliases:

Name Vendor Dr.Web classification name
Hacktool.Rootkit Symantec Win32.IRC.Bot.based
Hacktool.Rootkit Symantec Trojan.PWS.Grabber
Hacktool.Rootkit Symantec BackDoor.IRC.Sdbot.122
Hacktool.Rootkit Symantec BackDoor.Jaguar
Hacktool.Rootkit Symantec Trojan.Proxy.376
Hacktool.Rootkit Symantec BackDoor.Pipecmd
Hacktool.Rootkit Symantec BackDoor.Zaptot
Hacktool.Rootkit Symantec Trojan.MulDrop.1466
Hacktool.Rootkit Symantec BackDoor.Aphex
Hacktool.Rootkit Symantec Tool.Hideout
Hacktool.Rootkit Symantec BackDoor.Yetty
Hacktool.Rootkit Symantec BackDoor.IRC.Sdbot
Hacktool.Rootkit Symantec Trojan.Rootkit
Hacktool.Rootkit Symantec Trojan.PWS.Banker.739
Hacktool.Rootkit Symantec Trojan.Rootkit.2560
Hacktool.Rootkit Symantec BackDoor.Pigeon.16
Hacktool.Rootkit Symantec Trojan.Inspr.11
Hacktool.Rootkit Symantec Trojan.Hooker.29184
Hacktool.Rootkit Symantec Trojan.StartPage.371
Hacktool.Rootkit Symantec Trojan.Cipher
Hacktool.Rootkit Symantec BackDoor.Tomcom
Hacktool.Rootkit Symantec Trojan.He4RootKit
Hacktool.Rootkit Symantec Trojan.MulDrop.1707
Hacktool.Rootkit Symantec BackDoor.Starbot
Hacktool.Rootkit Symantec BackDoor.Hemhe
Hacktool.Rootkit Symantec Trojan.NtRootKit
Hacktool.Rootkit Symantec BackDoor.HackDef.84
Hacktool.Rootkit Symantec Trojan.AFX
Hacktool.Rootkit Symantec Trojan.MulDrop.2882
Hacktool.Rootkit Symantec Trojan.Morav
Hacktool.Rootkit Symantec Trojan.Wink
Hacktool.Rootkit Symantec Trojan.Rasjorge
Hacktool.Rootkit Symantec BackDoor.Lerver
Hacktool.Rootkit Symantec Trojan.KeyLogger.337
Hacktool.Rootkit Symantec Trojan.Spon
Hacktool.Rootkit Symantec Trojan.NtRootKit.26
Hacktool.Rootkit Symantec Win32.HLLW.Slacke.28672
Hacktool.Rootkit Symantec Trojan.NtRootKit.36
Hacktool.Rootkit Symantec Trojan.DownLoader.4640
Hacktool.Rootkit Symantec BackDoor.Insti.40
Hacktool.Rootkit Symantec Trojan.PWS.Matman
Hacktool.Rootkit Symantec BackDoor.Pigeon.133
Hacktool.Rootkit Symantec Trojan.NtRootKit.20
Hacktool.Rootkit Symantec BackDoor.Webdings
Hacktool.Rootkit Symantec Linux.BackDoor.Rootkit.1
Hacktool.Rootkit Symantec Linux.BackDoor.Rootkit.2
Hacktool.Rootkit Symantec Exploit.Cliph
Hacktool.Rootkit Symantec Exploit.LocalMail
Hacktool.Rootkit Symantec BackDoor.Merlion
Hacktool.Rootkit Symantec Linux.BackDoor.Longue

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.