Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan Horse aliases:

Name Vendor Dr.Web classification name
Trojan Horse Symantec Trojan.Zheng
Trojan Horse Symantec Trojan.Unkurm.22016
Trojan Horse Symantec Trojan.StartPage.677
Trojan Horse Symantec Trojan.StartPage.790
Trojan Horse Symantec Trojan.KeyLogger.190
Trojan Horse Symantec Trojan.PWS.Gamer
Trojan Horse Symantec Trojan.Wpr
Trojan Horse Symantec Trojan.KeyProbe
Trojan Horse Symantec Trojan.KeyLogger.103
Trojan Horse Symantec Trojan.PWS.Pwkiller
Trojan Horse Symantec Trojan.DownLoader.1268
Trojan Horse Symantec Trojan.KeyLogger.224
Trojan Horse Symantec Trojan.KeyLogger.223
Trojan Horse Symantec Trojan.RHelo
Trojan Horse Symantec Trojan.Uinip
Trojan Horse Symantec BackDoor.Agobot
Trojan Horse Symantec Trojan.Seokil
Trojan Horse Symantec Trojan.Tachi
Trojan Horse Symantec Trojan.Registrator
Trojan Horse Symantec Trojan.Uragan
Trojan Horse Symantec Trojan.PWS.Wintcp
Trojan Horse Symantec Trojan.PWS.Sniftp
Trojan Horse Symantec Trojan.M2.14
Trojan Horse Symantec Trojan.PWS.Coced.212
Trojan Horse Symantec Trojan.FileThief
Trojan Horse Symantec Trojan.PWS.Gao.10
Trojan Horse Symantec Trojan.PWS.Checknet
Trojan Horse Symantec Trojan.Cputhief
Trojan Horse Symantec Trojan.Ajan
Trojan Horse Symantec Trojan.MulDrop.2427
Trojan Horse Symantec FDOS.Pestil.20
Trojan Horse Symantec Trojan.Phisher
Trojan Horse Symantec Trojan.PM.10
Trojan Horse Symantec Trojan.PM
Trojan Horse Symantec Trojan.Powiod
Trojan Horse Symantec Nuke.WinNuke.56320
Trojan Horse Symantec Sniffer.NMCrack.20480
Trojan Horse Symantec Nuke.Genocide
Trojan Horse Symantec Nuke.KillMe.10
Trojan Horse Symantec Nuke.Muerte
Trojan Horse Symantec Nuke.Snuke
Trojan Horse Symantec Trojan.DownLoader.109
Trojan Horse Symantec BackDoor.Netspy.20
Trojan Horse Symantec Trojan.Manifest
Trojan Horse Symantec Trojan.Myex
Trojan Horse Symantec Trojan.Nawai
Trojan Horse Symantec Trojan.Neomail
Trojan Horse Symantec Trojan.KillFiles.50
Trojan Horse Symantec Win32.HLLW.Gislat
Trojan Horse Symantec Trojan.KillFiles.76

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.