Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

SScope.Trojan.Prosti.2 aliases:

Name Vendor Dr.Web classification name
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.DownLoader.18754
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.MulDrop.3332
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.MulDrop.3303
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.MulDrop.3276
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.MulDrop.3307
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.KeyLogger.456
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Insti.46
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Bofuh
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.11889
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Insti.44
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.343
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.DownLoader.11347
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.6286
SScope.Trojan.Prosti.2 VirusBlokAda Win32.HLLW.Autoruner.1891
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.6307
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.5414
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.5636
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Legmir.1982
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.5637
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Insti.108
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.8793
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Dosia.112
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.17735
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.5171
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.17269
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.17270
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Gamania.17262
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.DownLoader.36864
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Insti.338
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.8089
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.8820
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.8822
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.DownLoad.28933
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.8088
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.DownLoad.27632
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.8821
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.588
SScope.Trojan.Prosti.2 VirusBlokAda Win32.HLLW.MyBot.160
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.9840
SScope.Trojan.Prosti.2 VirusBlokAda Win32.HLLW.Kesk
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.MulDrop.4023
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.752
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.8072
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.Hitpop.183
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Dosia.108
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Pigeon.9957
SScope.Trojan.Prosti.2 VirusBlokAda Trojan.PWS.Wsgame.6334
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Insti.51
SScope.Trojan.Prosti.2 VirusBlokAda BackDoor.Insti.133

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.