Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan Horse aliases:

Name Vendor Dr.Web classification name
Trojan Horse Symantec Borrare
Trojan Horse Symantec Trojan.Rmdir.433
Trojan Horse Symantec Trojan.Rmdir.1009
Trojan Horse Symantec Trojan.Rmdir.469
Trojan Horse Symantec BackDoor.BrainSpy
Trojan Horse Symantec Trojan.AVKill.35797
Trojan Horse Symantec Trojan.Outlaw
Trojan Horse Symantec Trojan.AOLWar.10511
Trojan Horse Symantec Trojan.AOLWar.9755
Trojan Horse Symantec Trojan.AntiAVP.6672
Trojan Horse Symantec AFTG.Generator.10
Trojan Horse Symantec VBS.ColdPlay
Trojan Horse Symantec Win.Kondrik.15360
Trojan Horse Symantec Win32.HLLW.Shorm.22
Trojan Horse Symantec Win32.HLLW.Shorm.1
Trojan Horse Symantec Win32.HLLM.ReadServ
Trojan Horse Symantec Win32.HLLW.Music.39936
Trojan Horse Symantec Trojan.Kangen
Trojan Horse Symantec Worm.Hybris.816
Trojan Horse Symantec Win32.HLLW.Dedler
Trojan Horse Symantec Trojan.GrabMail
Trojan Horse Symantec Win32.HLLM.XIV.8
Trojan Horse Symantec Trojan.MulDrop.2875
Trojan Horse Symantec Trojan.Eat
Trojan Horse Symantec Trojan.Scare
Trojan Horse Symantec Trojan.VCL
Trojan Horse Symantec Trojan.Killer
Trojan Horse Symantec Trojan.Mwp
Trojan Horse Symantec Trojan.HeyChris
Trojan Horse Symantec Trojan.Infos
Trojan Horse Symantec Trojan.Fbi
Trojan Horse Symantec Trojan.4459
Trojan Horse Symantec Trojan.KillFiles.35590
Trojan Horse Symantec Trojan.Protect
Trojan Horse Symantec Trojan.GLXview
Trojan Horse Symantec Trojan.Swp
Trojan Horse Symantec Trojan.ArjGuru
Trojan Horse Symantec Trojan.VCC.550
Trojan Horse Symantec Trojan.Malice
Trojan Horse Symantec Trojan.Phine
Trojan Horse Symantec Trojan.Froggie
Trojan Horse Symantec Trojan.EatFlu
Trojan Horse Symantec Trojan.DelWin.128
Trojan Horse Symantec VBS.Generic.440
Trojan Horse Symantec Trojan.Smog
Trojan Horse Symantec Trojan.StartPage.685
Trojan Horse Symantec Trojan.Qhost.6905
Trojan Horse Symantec Trojan.DelSys.268
Trojan Horse Symantec VBS.Duke
Trojan Horse Symantec Trojan.StartPage.566

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.