Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec Trojan.PWS.Banker.based
PWSteal.Trojan Symantec Trojan.PWS.YahooSpy
PWSteal.Trojan Symantec Trojan.PWS.Legmir.425
PWSteal.Trojan Symantec Trojan.PWS.Gib
PWSteal.Trojan Symantec Trojan.PWS.Gip.110
PWSteal.Trojan Symantec Trojan.PWS.Qqpass.31
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.37
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.551
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.553
PWSteal.Trojan Symantec Trojan.PWS.Mu
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.26
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.31
PWSteal.Trojan Symantec Trojan.PWS.Faqone
PWSteal.Trojan Symantec BackDoor.Tapican
PWSteal.Trojan Symantec Trojan.PWS.Salidol
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.537
PWSteal.Trojan Symantec Trojan.Mayouch
PWSteal.Trojan Symantec Trojan.MulDrop.2807
PWSteal.Trojan Symantec Trojan.DownLoader.4603
PWSteal.Trojan Symantec Trojan.PWS.Legmir.382
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.533
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.33
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.462
PWSteal.Trojan Symantec Trojan.PWS.Gamania
PWSteal.Trojan Symantec Trojan.PWS.Wmsender
PWSteal.Trojan Symantec Trojan.PWS.Ymagic
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.516
PWSteal.Trojan Symantec BackDoor.Pigeon.36
PWSteal.Trojan Symantec Trojan.DownLoader.4528
PWSteal.Trojan Symantec Trojan.Wizza
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.115
PWSteal.Trojan Symantec Trojan.PWS.Fiu.162
PWSteal.Trojan Symantec Tool.MessenPass
PWSteal.Trojan Symantec Trojan.KeyLogger.80
PWSteal.Trojan Symantec Trojan.PWS.Pingma
PWSteal.Trojan Symantec Trojan.PWS.Mof
PWSteal.Trojan Symantec Trojan.PWS.Wei
PWSteal.Trojan Symantec Trojan.DownLoader.6321
PWSteal.Trojan Symantec Trojan.PWS.Latent
PWSteal.Trojan Symantec Trojan.Proxy.617
PWSteal.Trojan Symantec Trojan.PWS.Gamma
PWSteal.Trojan Symantec Trojan.PWS.Egold
PWSteal.Trojan Symantec Trojan.PWS.Observer
PWSteal.Trojan Symantec Trojan.UsualSpy
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.243
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.643
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.641
PWSteal.Trojan Symantec Win32.HLLM.Sacho
PWSteal.Trojan Symantec Win32.HLLM.Energy.40960
PWSteal.Trojan Symantec Trojan.PWS.Watcher

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.