Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan Horse aliases:

Name Vendor Dr.Web classification name
Trojan Horse Symantec Mordor.1110
Trojan Horse Symantec Trojan.NRLG
Trojan Horse Symantec Trojan.MulDrop.2424
Trojan Horse Symantec Trojan.Invade
Trojan Horse Symantec Trojan.Evils
Trojan Horse Symantec HLLO.Metastaz.39408
Trojan Horse Symantec Trojan.Makar.5392
Trojan Horse Symantec Trojan.BlcLooper
Trojan Horse Symantec Trojan.FormatC.1309
Trojan Horse Symantec Trojan.DiskTra
Trojan Horse Symantec Trojan.Eclipse
Trojan Horse Symantec Trojan.FormatC.4736
Trojan Horse Symantec Trojan.HDDKill.510
Trojan Horse Symantec Trojan.Feliks
Trojan Horse Symantec Trojan.KeySpy
Trojan Horse Symantec Trojan.KeySpy.989
Trojan Horse Symantec Kohntark.Kali.641
Trojan Horse Symantec Exploit.DialogArg
Trojan Horse Symantec Spam.NewsAgent.111
Trojan Horse Symantec Spam.NewsAgent.107
Trojan Horse Symantec Spam.NewsAgent.109
Trojan Horse Symantec VBS.Crisis
Trojan Horse Symantec Trojan.Game.36816
Trojan Horse Symantec Trojan.Insix.5643
Trojan Horse Symantec Trojan.Vivid
Trojan Horse Symantec Trojan.Horns.1425
Trojan Horse Symantec Trojan.DelWin.3616
Trojan Horse Symantec Trojan.Steel.5404
Trojan Horse Symantec Trojan.Super.7984
Trojan Horse Symantec HLLP.Spartak.12702
Trojan Horse Symantec HLLP.Spartak.6247
Trojan Horse Symantec Trojan.Pompos.6672
Trojan Horse Symantec Trojan.Pompos.6848
Trojan Horse Symantec Trojan.Pompos.6768
Trojan Horse Symantec Trojan.Moron.4704
Trojan Horse Symantec Trojan.Padla.6176
Trojan Horse Symantec Trojan.KillFiles.3648
Trojan Horse Symantec Trojan.Pompos.2528
Trojan Horse Symantec Trojan.FormatC.2896
Trojan Horse Symantec Trojan.DDI
Trojan Horse Symantec Trojan.Pricol.4037
Trojan Horse Symantec Trojan.Andum.3584
Trojan Horse Symantec Trojan.Andum.3648
Trojan Horse Symantec Trojan.Andum.3968
Trojan Horse Symantec Trojan.HDDKill.4400
Trojan Horse Symantec Trojan.FormatC.2781
Trojan Horse Symantec HLLC.11136
Trojan Horse Symantec HLLW.Virri.33328
Trojan Horse Symantec HLLW.Virri.43904
Trojan Horse Symantec HLLW.Virri.43448

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.