Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_ADCLICKER.A aliases:

Name Vendor Dr.Web classification name
TROJ_ADCLICKER.A Trend Micro Trojan.StartPage.289
TROJ_ADCLICKER.A Trend Micro Trojan.Click.152
TROJ_ADCLICKER.A Trend Micro Trojan.Click.65
TROJ_ADCLICKER.A Trend Micro Trojan.Click.32833
TROJ_ADCLICKER.A Trend Micro Trojan.DownLoader.760
TROJ_ADCLICKER.A Trend Micro Trojan.Ruvok
TROJ_ADCLICKER.A Trend Micro Trojan.Adpop
TROJ_ADCLICKER.A Trend Micro Trojan.Click
TROJ_ADCLICKER.A Trend Micro Trojan.Click.133
TROJ_ADCLICKER.A Trend Micro Trojan.Click.132
TROJ_ADCLICKER.A Trend Micro Trojan.Scorpech
TROJ_ADCLICKER.A Trend Micro Trojan.AddClick.20480
TROJ_ADCLICKER.A Trend Micro Trojan.Click.28672
TROJ_ADCLICKER.A Trend Micro Trojan.Unlair
TROJ_ADCLICKER.A Trend Micro Trojan.Adcli
TROJ_ADCLICKER.A Trend Micro Trojan.Miniwish
TROJ_ADCLICKER.A Trend Micro Trojan.Hardss
TROJ_ADCLICKER.A Trend Micro Trojan.Isbar
TROJ_ADCLICKER.A Trend Micro Trojan.Outwar
TROJ_ADCLICKER.A Trend Micro Trojan.BcrayClick
TROJ_ADCLICKER.A Trend Micro Adware.Popuper
TROJ_ADCLICKER.A Trend Micro HackAbc.Generator
TROJ_ADCLICKER.A Trend Micro Trojan.Sytak
TROJ_ADCLICKER.A Trend Micro BackDoor.Generic.335
TROJ_ADCLICKER.A Trend Micro Adware.MySearch
TROJ_ADCLICKER.A Trend Micro Trojan.Click.147
TROJ_ADCLICKER.A Trend Micro Trojan.Click.185
TROJ_ADCLICKER.A Trend Micro Trojan.AddClick
TROJ_ADCLICKER.A Trend Micro Trojan.Click.83
TROJ_ADCLICKER.A Trend Micro Trojan.Click.276
TROJ_ADCLICKER.A Trend Micro Trojan.Click.148
TROJ_ADCLICKER.A Trend Micro Trojan.Click.59
TROJ_ADCLICKER.A Trend Micro Trojan.Sjfs
TROJ_ADCLICKER.A Trend Micro Trojan.DownLoader.694
TROJ_ADCLICKER.A Trend Micro Trojan.Clipan
TROJ_ADCLICKER.A Trend Micro Win32.HLLM.Reteras
TROJ_ADCLICKER.A Trend Micro Trojan.Addown
TROJ_ADCLICKER.A Trend Micro Trojan.Click.3072
TROJ_ADCLICKER.A Trend Micro Trojan.Stom
TROJ_ADCLICKER.A Trend Micro Trojan.Ideach
TROJ_ADCLICKER.A Trend Micro Trojan.Clikun
TROJ_ADCLICKER.A Trend Micro BackDoor.Generic.981
TROJ_ADCLICKER.A Trend Micro Trojan.Click.44
TROJ_ADCLICKER.A Trend Micro Trojan.Click.32768
TROJ_ADCLICKER.A Trend Micro BackDoor.Generic.666
TROJ_ADCLICKER.A Trend Micro BackDoor.Generic.914
TROJ_ADCLICKER.A Trend Micro Trojan.DownLoader.8577
TROJ_ADCLICKER.A Trend Micro Trojan.PWS.Legmir
TROJ_ADCLICKER.A Trend Micro Trojan.DownLoader.9420
TROJ_ADCLICKER.A Trend Micro Trojan.MulDrop.892

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.