Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Comame aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Comame Microsoft Trojan.MulDrop.21076
Trojan:Win32/Comame Microsoft Trojan.SCKeyLog.48
Trojan:Win32/Comame Microsoft Trojan.DownLoader.23806
Trojan:Win32/Comame Microsoft Trojan.Packed.471
Trojan:Win32/Comame Microsoft Trojan.Shutdown
Trojan:Win32/Comame Microsoft Trojan.PWS.Escrow
Trojan:Win32/Comame Microsoft Trojan.DownLoader.37780
Trojan:Win32/Comame Microsoft Trojan.Qhost
Trojan:Win32/Comame Microsoft Trojan.Hosts.32
Trojan:Win32/Comame Microsoft Win32.HLLW.Amir
Trojan:Win32/Comame Microsoft Trojan.MulDrop.9869
Trojan:Win32/Comame Microsoft Trojan.Mellpal
Trojan:Win32/Comame Microsoft Trojan.DownLoad.28752
Trojan:Win32/Comame Microsoft Win32.HLLW.Harada
Trojan:Win32/Comame Microsoft Win32.HLLW.Fagot.17
Trojan:Win32/Comame Microsoft BackDoor.Rozmowa.28
Trojan:Win32/Comame Microsoft Trojan.DownLoader.36804
Trojan:Win32/Comame Microsoft Win32.HLLW.Fagot.16
Trojan:Win32/Comame Microsoft Trojan.DownLoader.52641
Trojan:Win32/Comame Microsoft Win32.HLLW.Autoruner.737
Trojan:Win32/Comame Microsoft Trojan.SmsDos.6
Trojan:Win32/Comame Microsoft Trojan.KeyLogger.origin
Trojan:Win32/Comame Microsoft Trojan.Click.26204
Trojan:Win32/Comame Microsoft Trojan.Click.origin
Trojan:Win32/Comame Microsoft Trojan.Hoster.214
Trojan:Win32/Comame Microsoft Trojan.DownLoader.34108
Trojan:Win32/Comame Microsoft Trojan.Packed.437
Trojan:Win32/Comame Microsoft Trojan.AVKill.404
Trojan:Win32/Comame Microsoft Trojan.DownLoader.52908
Trojan:Win32/Comame Microsoft Trojan.PWS.Tibia
Trojan:Win32/Comame Microsoft Trojan.PWS.Wow.912
Trojan:Win32/Comame Microsoft Trojan.DownLoader.54577
Trojan:Win32/Comame Microsoft BackDoor.Ogro
Trojan:Win32/Comame Microsoft Trojan.PWS.Finanz
Trojan:Win32/Comame Microsoft Trojan.MulDrop.32703
Trojan:Win32/Comame Microsoft Trojan.DownLoad.28645
Trojan:Win32/Comame Microsoft Trojan.DownLoader.34377
Trojan:Win32/Comame Microsoft Trojan.Click.25482
Trojan:Win32/Comame Microsoft Trojan.DownLoader.35761
Trojan:Win32/Comame Microsoft Trojan.DownLoad.955
Trojan:Win32/Comame Microsoft BackDoor.BlackHole.3392
Trojan:Win32/Comame Microsoft Trojan.Spambot.3531
Trojan:Win32/Comame Microsoft Trojan.Spambot.3584
Trojan:Win32/Comame Microsoft Trojan.DownLoad.155
Trojan:Win32/Comame Microsoft Trojan.DownLoad.3687
Trojan:Win32/Comame Microsoft Trojan.MulDrop.764
Trojan:Win32/Comame Microsoft Trojan.DownLoad.39804
Trojan:Win32/Comame Microsoft Adware.QQHelp.603
Trojan:Win32/Comame Microsoft Trojan.Harada
Trojan:Win32/Comame Microsoft Trojan.Click.25997

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.