Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_AVKILLP.MCS aliases:

Name Vendor Dr.Web classification name
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.LDPinch.4308
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.30373
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.12166
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.Gamania.7874
TROJ_AVKILLP.MCS Trend Micro Trojan.Packed.496
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.16572
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.Banker.21338
TROJ_AVKILLP.MCS Trend Micro Trojan.Click.18121
TROJ_AVKILLP.MCS Trend Micro BackDoor.Beizhu.1070
TROJ_AVKILLP.MCS Trend Micro Trojan.Packed.487
TROJ_AVKILLP.MCS Trend Micro Trojan.Packed.472
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.LDPinch.1549
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.13643
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.13715
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.9787
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.6989
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.11210
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.8208
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.15553
TROJ_AVKILLP.MCS Trend Micro Trojan.Packed.454
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.16013
TROJ_AVKILLP.MCS Trend Micro Trojan.Packed.470
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.Gamania.8141
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.10888
TROJ_AVKILLP.MCS Trend Micro Trojan.Shua.142
TROJ_AVKILLP.MCS Trend Micro BackDoor.Pigeon.8243
TROJ_AVKILLP.MCS Trend Micro Trojan.DownLoader.43050
TROJ_AVKILLP.MCS Trend Micro Trojan.Click.18702
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.Gang
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.11825
TROJ_AVKILLP.MCS Trend Micro Trojan.Inject.778
TROJ_AVKILLP.MCS Trend Micro Trojan.Hitpop.80
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.12159
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.LDPinch.1941
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.8347
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.Gamania.9338
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.LDPinch.1407
TROJ_AVKILLP.MCS Trend Micro BackDoor.Pigeon.12468
TROJ_AVKILLP.MCS Trend Micro BackDoor.Beizhu.620
TROJ_AVKILLP.MCS Trend Micro Trojan.PWS.Banker.21810
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.10866
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.6456
TROJ_AVKILLP.MCS Trend Micro BackDoor.Beizhu.745
TROJ_AVKILLP.MCS Trend Micro Trojan.Packed.152
TROJ_AVKILLP.MCS Trend Micro Trojan.DownLoader.63494
TROJ_AVKILLP.MCS Trend Micro Trojan.Inject.3257
TROJ_AVKILLP.MCS Trend Micro Trojan.Inject.3239
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.9951
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.12068
TROJ_AVKILLP.MCS Trend Micro Trojan.MulDrop.17092

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.