Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Trafog!rts aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Trafog!rts Microsoft Trojan.DownLoader.52495
Trojan:Win32/Trafog!rts Microsoft Win32.HLLW.Sage
Trojan:Win32/Trafog!rts Microsoft Trojan.DownLoader.48195
Trojan:Win32/Trafog!rts Microsoft Trojan.Inject.279
Trojan:Win32/Trafog!rts Microsoft Trojan.MulDrop.6467
Trojan:Win32/Trafog!rts Microsoft BackDoor.NeoArk.139
Trojan:Win32/Trafog!rts Microsoft Win32.HLLM.Limar.2283
Trojan:Win32/Trafog!rts Microsoft Win32.HLLM.Famus
Trojan:Win32/Trafog!rts Microsoft Trojan.Blackmailer.783
Trojan:Win32/Trafog!rts Microsoft Tool.Qqhack.2
Trojan:Win32/Trafog!rts Microsoft Trojan.NtRootKit.19
Trojan:Win32/Trafog!rts Microsoft Trojan.Starter
Trojan:Win32/Trafog!rts Microsoft Win32.HLLM.Sober
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Jevan
Trojan:Win32/Trafog!rts Microsoft BackDoor.Bifrost.759
Trojan:Win32/Trafog!rts Microsoft BackDoor.Iroffer.1229
Trojan:Win32/Trafog!rts Microsoft Trojan.KeyLogger.21
Trojan:Win32/Trafog!rts Microsoft BackDoor.Girls
Trojan:Win32/Trafog!rts Microsoft Trojan.WSLogger
Trojan:Win32/Trafog!rts Microsoft Trojan.Soul.1442
Trojan:Win32/Trafog!rts Microsoft BackDoor.Niklaus
Trojan:Win32/Trafog!rts Microsoft Trojan.CreatEX
Trojan:Win32/Trafog!rts Microsoft BackDoor.AntiLame.20
Trojan:Win32/Trafog!rts Microsoft BWG.Generator.411
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Vipgsm
Trojan:Win32/Trafog!rts Microsoft Trojan.Inject.494
Trojan:Win32/Trafog!rts Microsoft Trojan.DownLoad.9365
Trojan:Win32/Trafog!rts Microsoft Trojan.Click.17998
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.MailOut.1
Trojan:Win32/Trafog!rts Microsoft Trojan.Packed.1197
Trojan:Win32/Trafog!rts Microsoft BackDoor.BO2k.99
Trojan:Win32/Trafog!rts Microsoft Program.ServUServer.5208
Trojan:Win32/Trafog!rts Microsoft Tool.Zerogen
Trojan:Win32/Trafog!rts Microsoft Program.Wpe
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Stealer.27
Trojan:Win32/Trafog!rts Microsoft BackDoor.NetCrack.11
Trojan:Win32/Trafog!rts Microsoft BackDoor.Horizen
Trojan:Win32/Trafog!rts Microsoft BackDoor.Sequel.12
Trojan:Win32/Trafog!rts Microsoft Trojan.MailBomber
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Banker.18795
Trojan:Win32/Trafog!rts Microsoft Trojan.Siggen.2207
Trojan:Win32/Trafog!rts Microsoft Trojan.Popuper
Trojan:Win32/Trafog!rts Microsoft FDOS.Kaiten
Trojan:Win32/Trafog!rts Microsoft Trojan.MulDrop.32692
Trojan:Win32/Trafog!rts Microsoft Trojan.SpaceEater
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Gadu
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Tibia.217
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Kiska.13
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Gina.46
Trojan:Win32/Trafog!rts Microsoft Trojan.PWS.Gamania.7719

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.