Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_NSAnti aliases:

Name Vendor Dr.Web classification name
Mal_NSAnti Trend Micro BackDoor.Bifrost.74
Mal_NSAnti Trend Micro Trojan.PWS.Qqgame
Mal_NSAnti Trend Micro BackDoor.Cia.28
Mal_NSAnti Trend Micro Trojan.StartPage.1209
Mal_NSAnti Trend Micro BackDoor.Nuclear.12
Mal_NSAnti Trend Micro BackDoor.BlackHole.2075
Mal_NSAnti Trend Micro Trojan.KeyLogger.219
Mal_NSAnti Trend Micro BackDoor.Pigeon.3462
Mal_NSAnti Trend Micro BackDoor.Portless.11
Mal_NSAnti Trend Micro BackDoor.EggDrop.16
Mal_NSAnti Trend Micro Tool.Replace
Mal_NSAnti Trend Micro Trojan.PWS.Maran.318
Mal_NSAnti Trend Micro BackDoor.Pigeon.154
Mal_NSAnti Trend Micro BackDoor.Bifrost.11
Mal_NSAnti Trend Micro BackDoor.Pigeon.191
Mal_NSAnti Trend Micro BackDoor.Pigeon.389
Mal_NSAnti Trend Micro BackDoor.Pigeon.12848
Mal_NSAnti Trend Micro BackDoor.Pigeon.8028
Mal_NSAnti Trend Micro Trojan.PWS.Gamania.3046
Mal_NSAnti Trend Micro Trojan.Nsanti.Packed
Mal_NSAnti Trend Micro Trojan.PWS.Gamania.3028
Mal_NSAnti Trend Micro BackDoor.Pigeon.4693
Mal_NSAnti Trend Micro BackDoor.Pigeon.4719
Mal_NSAnti Trend Micro Trojan.MulDrop.10610
Mal_NSAnti Trend Micro Trojan.PWS.Wsgame.1658
Mal_NSAnti Trend Micro BackDoor.Soul
Mal_NSAnti Trend Micro Trojan.PWS.Wsgame.3547
Mal_NSAnti Trend Micro Trojan.DownLoader.13881
Mal_NSAnti Trend Micro Trojan.DownLoader.4995
Mal_NSAnti Trend Micro Trojan.PWS.Wsgame.3103
Mal_NSAnti Trend Micro BackDoor.Pigeon.5
Mal_NSAnti Trend Micro BackDoor.Zhao
Mal_NSAnti Trend Micro BackDoor.IRC.Sdbot.168
Mal_NSAnti Trend Micro Trojan.DownLoader.43099
Mal_NSAnti Trend Micro Trojan.DownLoader.46800
Mal_NSAnti Trend Micro Trojan.DownLoader.3995
Mal_NSAnti Trend Micro BackDoor.Systm
Mal_NSAnti Trend Micro Trojan.Click.16756
Mal_NSAnti Trend Micro Trojan.PWS.Qqpass.50
Mal_NSAnti Trend Micro Tool.DialupPass.243
Mal_NSAnti Trend Micro Trojan.IPCScan
Mal_NSAnti Trend Micro Trojan.PWS.Gamania
Mal_NSAnti Trend Micro Program.RemoteAdmin.36
Mal_NSAnti Trend Micro Program.RemoteAdmin
Mal_NSAnti Trend Micro Trojan.DownLoader.27697
Mal_NSAnti Trend Micro Trojan.DownLoader.33542
Mal_NSAnti Trend Micro Nuke.Miso
Mal_NSAnti Trend Micro Trojan.PWS.Lineage.2926
Mal_NSAnti Trend Micro Trojan.PWS.Maran
Mal_NSAnti Trend Micro BackDoor.Pigeon.766

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.