Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_SPYEYE.SMEP aliases:

Name Vendor Dr.Web classification name
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Siggen.9571
TROJ_SPYEYE.SMEP Trend Micro BackDoor.Qbot.51
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.387
TROJ_SPYEYE.SMEP Trend Micro BackDoor.Qbot.58
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.460
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18737
TROJ_SPYEYE.SMEP Trend Micro BackDoor.Qbot.64
TROJ_SPYEYE.SMEP Trend Micro Trojan.Inject.13710
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18727
TROJ_SPYEYE.SMEP Trend Micro BackDoor.Qbot.57
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.383
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.547
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.SpySweep.35
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18777
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18732
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18785
TROJ_SPYEYE.SMEP Trend Micro BackDoor.Qbot.26
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.429
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18631
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.549
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.452
TROJ_SPYEYE.SMEP Trend Micro BackDoor.Qbot.55
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.171
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18804
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18594
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.273
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Siggen.10351
TROJ_SPYEYE.SMEP Trend Micro Trojan.Inject.14127
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.490
TROJ_SPYEYE.SMEP Trend Micro Trojan.PWS.Panda.538
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18746
TROJ_SPYEYE.SMEP Trend Micro Trojan.Proxy.18776

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.