Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Ertfor.A aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoader.22298
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.15174
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.29298
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.452
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.2061
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.28089
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.196
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.448
Trojan:Win32/Ertfor.A Microsoft Trojan.MulDrop.9807
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.29297
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.29328
Trojan:Win32/Ertfor.A Microsoft Trojan.MulDrop.34058
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.29181
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.29442
Trojan:Win32/Ertfor.A Microsoft Trojan.MulDrop.30417
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoader.7467
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoader.11657
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoader.11906
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.31336
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoader.26090
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoader.26579
Trojan:Win32/Ertfor.A Microsoft Trojan.MulDrop.13675
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.36224
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.36191
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.36190
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.36165
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.142
Trojan:Win32/Ertfor.A Microsoft Trojan.MulDrop.15552
Trojan:Win32/Ertfor.A Microsoft Trojan.MulDrop.15551
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.612
Trojan:Win32/Ertfor.A Microsoft Trojan.Click.19754
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.568
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.37332
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.2463
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.37333
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.38361
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.38314
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.38491
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.2918
Trojan:Win32/Ertfor.A Microsoft Trojan.MulDrop.33590
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad1.35398
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad1.35996
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.40125
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.627
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.40106
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.49164
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoader.origin
Trojan:Win32/Ertfor.A Microsoft Trojan.DownLoad.36272
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.366
Trojan:Win32/Ertfor.A Microsoft Trojan.Packed.226

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.