Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan Horse aliases:

Name Vendor Dr.Web classification name
Trojan Horse Symantec BackDoor.Skydance.220
Trojan Horse Symantec BackDoor.Phoenix.250
Trojan Horse Symantec DDoS.Kaiten.53248
Trojan Horse Symantec BackDoor.Control.21
Trojan Horse Symantec BackDoor.NetBull.11
Trojan Horse Symantec BackDoor.Kather.305
Trojan Horse Symantec BackDoor.Insane.4
Trojan Horse Symantec BackDoor.Bidon
Trojan Horse Symantec Trojan.MulDrop.3053
Trojan Horse Symantec Trojan.MulDrop.1075
Trojan Horse Symantec BackDoor.Agent
Trojan Horse Symantec BackDoor.Noko
Trojan Horse Symantec BackDoor.Rat
Trojan Horse Symantec BackDoor.SVC
Trojan Horse Symantec BackDoor.AckCmd.11
Trojan Horse Symantec Trojan.Proxy.354
Trojan Horse Symantec Trojan.PWS.Banker.469
Trojan Horse Symantec Trojan.PWS.Banker.467
Trojan Horse Symantec Trojan.Graspy
Trojan Horse Symantec BackDoor.RunEm
Trojan Horse Symantec Trojan.JooAd
Trojan Horse Symantec Trojan.DownLoader.2332
Trojan Horse Symantec Trojan.MulDrop.2594
Trojan Horse Symantec Trojan.Click.511
Trojan Horse Symantec Trojan.Xcomm
Trojan Horse Symantec Trojan.Pornlink
Trojan Horse Symantec Trojan.MadmailSpy
Trojan Horse Symantec Exploit.DCom.44
Trojan Horse Symantec Win32.HLLM.Baitap
Trojan Horse Symantec Trojan.Almaeda
Trojan Horse Symantec Trojan.MulDrop.1467
Trojan Horse Symantec Trojan.PWS.Yoyo
Trojan Horse Symantec Trojan.Pier
Trojan Horse Symantec Trojan.Haksor
Trojan Horse Symantec Trojan.Wizhell
Trojan Horse Symantec Trojan.WT
Trojan Horse Symantec Trojan.Wzbot
Trojan Horse Symantec Trojan.ZoneKill
Trojan Horse Symantec Win32.HLLW.Demivi.28672
Trojan Horse Symantec Trojan.WGetmo
Trojan Horse Symantec Trojan.Funny.12288
Trojan Horse Symantec Trojan.Rhino
Trojan Horse Symantec Trojan.Share.24576
Trojan Horse Symantec Win32.HLLW.Windang
Trojan Horse Symantec Trojan.WinF
Trojan Horse Symantec Trojan.Migl
Trojan Horse Symantec Trojan.Vivax
Trojan Horse Symantec Trojan.Waren.12800
Trojan Horse Symantec Trojan.Mdt
Trojan Horse Symantec Trojan.Bomb.78

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.