Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/C2Lop.C aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/C2Lop.C Microsoft Trojan.Packed.149
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.18349
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.18352
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.18346
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.18350
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.18988
Trojan:Win32/C2Lop.C Microsoft Trojan.GLoad
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.18351
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.18348
Trojan:Win32/C2Lop.C Microsoft Trojan.Inject.220
Trojan:Win32/C2Lop.C Microsoft Trojan.Inject.233
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.20667
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.24039
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.376
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.391
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.381
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.375
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.377
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.388
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.13318
Trojan:Win32/C2Lop.C Microsoft BackDoor.Hufer
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.13320
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.14508
Trojan:Win32/C2Lop.C Microsoft Trojan.DownLoader.14782
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.3481
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.3482
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.385
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.386
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.379
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.390
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.383
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.382
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.384
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.389
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.378
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.380
Trojan:Win32/C2Lop.C Microsoft Trojan.Swizzor.14744
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen1.5850
Trojan:Win32/C2Lop.C Microsoft Trojan.Winlock.1070
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.63608
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.62792
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.59723
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.63712
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.60951
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen1.6597
Trojan:Win32/C2Lop.C Microsoft Trojan.Winlock.1113
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.60594
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.58684
Trojan:Win32/C2Lop.C Microsoft Trojan.Siggen.64062

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.