Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Lodap!rts aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Lodap!rts Microsoft Win32.HLLM.Tetris
Trojan:Win32/Lodap!rts Microsoft BackDoor.Doker
Trojan:Win32/Lodap!rts Microsoft Trojan.Johnny
Trojan:Win32/Lodap!rts Microsoft BackDoor.Insyst
Trojan:Win32/Lodap!rts Microsoft Win32.HLLM.Mugem
Trojan:Win32/Lodap!rts Microsoft BackDoor.NetBus.22
Trojan:Win32/Lodap!rts Microsoft BackDoor.Emule.2
Trojan:Win32/Lodap!rts Microsoft BackDoor.Neoturk.16
Trojan:Win32/Lodap!rts Microsoft Trojan.StartPage.521
Trojan:Win32/Lodap!rts Microsoft BackDoor.Rat
Trojan:Win32/Lodap!rts Microsoft Trojan.StartPage.20410
Trojan:Win32/Lodap!rts Microsoft Trojan.Proxy.1030
Trojan:Win32/Lodap!rts Microsoft Trojan.NtRootKit.148
Trojan:Win32/Lodap!rts Microsoft Trojan.Click.1719
Trojan:Win32/Lodap!rts Microsoft Inorgen.Generator
Trojan:Win32/Lodap!rts Microsoft DDoS.Memo.5120
Trojan:Win32/Lodap!rts Microsoft Trojan.FormatC.1309
Trojan:Win32/Lodap!rts Microsoft Trojan.Proxy.1796
Trojan:Win32/Lodap!rts Microsoft Trojan.PWS.Lineage.4506
Trojan:Win32/Lodap!rts Microsoft Program.ServUServer.60
Trojan:Win32/Lodap!rts Microsoft BackDoor.Kurban
Trojan:Win32/Lodap!rts Microsoft Tool.Sshscan
Trojan:Win32/Lodap!rts Microsoft Trojan.PWS.Ragnarok
Trojan:Win32/Lodap!rts Microsoft BackDoor.Hitman
Trojan:Win32/Lodap!rts Microsoft FDOS.Teebomb
Trojan:Win32/Lodap!rts Microsoft Trojan.MadmailSpy
Trojan:Win32/Lodap!rts Microsoft Trojan.StartPage.1816
Trojan:Win32/Lodap!rts Microsoft Dialer.Amateur
Trojan:Win32/Lodap!rts Microsoft Trojan.Antimac
Trojan:Win32/Lodap!rts Microsoft BackDoor.Masoft
Trojan:Win32/Lodap!rts Microsoft Program.ServUServer
Trojan:Win32/Lodap!rts Microsoft Trojan.Vbspreader
Trojan:Win32/Lodap!rts Microsoft Win32.Jakky
Trojan:Win32/Lodap!rts Microsoft Trojan.StartPage.20756
Trojan:Win32/Lodap!rts Microsoft Trojan.KeyLogger.1428
Trojan:Win32/Lodap!rts Microsoft Trojan.DownLoader.36430
Trojan:Win32/Lodap!rts Microsoft Trojan.DownLoader.4333
Trojan:Win32/Lodap!rts Microsoft Trojan.DownLoader.44738
Trojan:Win32/Lodap!rts Microsoft BackDoor.Sysmodul
Trojan:Win32/Lodap!rts Microsoft Trojan.EmailSpy
Trojan:Win32/Lodap!rts Microsoft Trojan.Blockin
Trojan:Win32/Lodap!rts Microsoft Trojan.Proxy.2108
Trojan:Win32/Lodap!rts Microsoft BackDoor.Phime
Trojan:Win32/Lodap!rts Microsoft BackDoor.Nugor
Trojan:Win32/Lodap!rts Microsoft Exploit.Gasot
Trojan:Win32/Lodap!rts Microsoft Trojan.DownLoader.55606
Trojan:Win32/Lodap!rts Microsoft Exploit.Gore
Trojan:Win32/Lodap!rts Microsoft Win32.HLLW.Autoruner.1199
Trojan:Win32/Lodap!rts Microsoft Tool.ICQPass
Trojan:Win32/Lodap!rts Microsoft Trojan.DownLoader.20244

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.