Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan Horse aliases:

Name Vendor Dr.Web classification name
Trojan Horse Symantec VBS.Generic.74
Trojan Horse Symantec Trojan.Seeker.47
Trojan Horse Symantec IRC.Petq
Trojan Horse Symantec IRC.Generic.121
Trojan Horse Symantec Win32.HLLW.SpyBot
Trojan Horse Symantec VBS.Generic.426
Trojan Horse Symantec JS.Nezev
Trojan Horse Symantec Trojan.Puzzle
Trojan Horse Symantec Trojan.Seeker.70
Trojan Horse Symantec Trojan.Tinybar
Trojan Horse Symantec VBS.Iam
Trojan Horse Symantec VBS.Lee
Trojan Horse Symantec VBS.Inor
Trojan Horse Symantec Trojan.MulDrop.991
Trojan Horse Symantec Trojan.Seeker.160
Trojan Horse Symantec VBS.Generic.147
Trojan Horse Symantec O97M.Demon
Trojan Horse Symantec VBS.TSWSVK
Trojan Horse Symantec FreeBSD.Trojan.Rootkit
Trojan Horse Symantec Unix.Trojan.Uucp.1939
Trojan Horse Symantec Unix.Trojan.Uucp.399
Trojan Horse Symantec Trivial.121
Trojan Horse Symantec Trojan.Syscheck.39920
Trojan Horse Symantec Trojan.SpeedModem
Trojan Horse Symantec Sirius.Generator.10
Trojan Horse Symantec Trojan.Gds.33838
Trojan Horse Symantec Ramones
Trojan Horse Symantec Trojan.Eraser.1199
Trojan Horse Symantec Trojan.PBook
Trojan Horse Symantec Trojan.Cmpufon
Trojan Horse Symantec Trojan.KillFiles.68
Trojan Horse Symantec Trojan.Metahog
Trojan Horse Symantec Trojan.Mypicz
Trojan Horse Symantec Trojan.Ivan
Trojan Horse Symantec Trojan.MkDirs.29456
Trojan Horse Symantec Trojan.Eraser.31548
Trojan Horse Symantec Trojan.Ugly.31112
Trojan Horse Symantec Trojan.Ugly.29356
Trojan Horse Symantec Trojan.Halaulu
Trojan Horse Symantec BackDoor.BOrifice.10
Trojan Horse Symantec Nuke.NukeWarez.4144
Trojan Horse Symantec Trojan.MudPunk
Trojan Horse Symantec Mordor.1110
Trojan Horse Symantec Trojan.NRLG
Trojan Horse Symantec Trojan.Caligula
Trojan Horse Symantec Trojan.Mfm
Trojan Horse Symantec Trojan.FormatC.7002
Trojan Horse Symantec Trojan.MDaemon
Trojan Horse Symantec Trojan.BlcLooper
Trojan Horse Symantec Trojan.Kitty

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.