Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Provis!rts aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Provis!rts Microsoft Trojan.Click.25999
Trojan:Win32/Provis!rts Microsoft Trojan.Ftpspy
Trojan:Win32/Provis!rts Microsoft BackDoor.Trallano
Trojan:Win32/Provis!rts Microsoft Win32.HLLM.Generic.263
Trojan:Win32/Provis!rts Microsoft Trojan.PWS.Bancos.248
Trojan:Win32/Provis!rts Microsoft Win32.HLLW.Papik
Trojan:Win32/Provis!rts Microsoft Trojan.DownLoader.18968
Trojan:Win32/Provis!rts Microsoft Trojan.Click.635
Trojan:Win32/Provis!rts Microsoft Trojan.DownLoader.37577
Trojan:Win32/Provis!rts Microsoft BackDoor.Generic.1613
Trojan:Win32/Provis!rts Microsoft Trojan.Inject.5368
Trojan:Win32/Provis!rts Microsoft Win32.HLLW.Autoruner.3722
Trojan:Win32/Provis!rts Microsoft Trojan.Click.1365
Trojan:Win32/Provis!rts Microsoft Trojan.Click.650
Trojan:Win32/Provis!rts Microsoft Tool.Hotmailhack
Trojan:Win32/Provis!rts Microsoft BackDoor.Luigi
Trojan:Win32/Provis!rts Microsoft Trojan.Npk.20
Trojan:Win32/Provis!rts Microsoft Trojan.Grab
Trojan:Win32/Provis!rts Microsoft Trojan.Kunz
Trojan:Win32/Provis!rts Microsoft BackDoor.Spy.36
Trojan:Win32/Provis!rts Microsoft Win32.HLLW.Viral
Trojan:Win32/Provis!rts Microsoft Win32.HLLM.Generic.382
Trojan:Win32/Provis!rts Microsoft Trojan.PWS.Legmir.391
Trojan:Win32/Provis!rts Microsoft Win32.HLLW.Brontok
Trojan:Win32/Provis!rts Microsoft Trojan.Slrave
Trojan:Win32/Provis!rts Microsoft BackDoor.Aimbot
Trojan:Win32/Provis!rts Microsoft BackDoor.Dolan
Trojan:Win32/Provis!rts Microsoft Trojan.Siggen.4484
Trojan:Win32/Provis!rts Microsoft BackDoor.Sanaz.1
Trojan:Win32/Provis!rts Microsoft BackDoor.Sanaz.2
Trojan:Win32/Provis!rts Microsoft Win32.HLLW.Rasputin
Trojan:Win32/Provis!rts Microsoft Trojan.Siggen.219
Trojan:Win32/Provis!rts Microsoft Constructor.Siggen.382
Trojan:Win32/Provis!rts Microsoft Trojan.Click.18
Trojan:Win32/Provis!rts Microsoft Trojan.Ulone
Trojan:Win32/Provis!rts Microsoft Trojan.PWS.Jerbi
Trojan:Win32/Provis!rts Microsoft Trojan.KeyLogger.188
Trojan:Win32/Provis!rts Microsoft Trojan.Click.16823
Trojan:Win32/Provis!rts Microsoft Trojan.Qqnet.3
Trojan:Win32/Provis!rts Microsoft Win32.HLLW.Spreader.18
Trojan:Win32/Provis!rts Microsoft Trojan.PWS.Godge
Trojan:Win32/Provis!rts Microsoft Trojan.Siggen.2001
Trojan:Win32/Provis!rts Microsoft Trojan.Siggen.1991
Trojan:Win32/Provis!rts Microsoft Trojan.PWS.Webmonier.30
Trojan:Win32/Provis!rts Microsoft BackDoor.Assec.11
Trojan:Win32/Provis!rts Microsoft Trojan.DownLoad.41539
Trojan:Win32/Provis!rts Microsoft Trojan.Click.19362
Trojan:Win32/Provis!rts Microsoft Trojan.Marllo
Trojan:Win32/Provis!rts Microsoft BackDoor.Zinyth
Trojan:Win32/Provis!rts Microsoft Trojan.KeyLogger.601

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.