My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets


Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.AppActXComp aliases:

Name Vendor Dr.Web classification name
VBS/Forkey!Trojan Computer Associates Trojan.AppActXComp
PWS.Hooker.Trojan Symantec Trojan.AppActXComp
TROJ_HOOKER.A Trend Micro Trojan.AppActXComp
JScript/SPCKeylogger!Dropper Computer Associates Trojan.AppActXComp
JScript/Moon.B!Worm Computer Associates Trojan.AppActXComp
Email-Worm.VBS.Kogalu Kaspersky Trojan.AppActXComp
JScript/Gol!Trojan Computer Associates Trojan.AppActXComp
VBS.Moon@mm Symantec Trojan.AppActXComp
VBS_NEMITE.A Trend Micro Trojan.AppActXComp
VBS/Dismissed.gen McAfee Trojan.AppActXComp
CHM/JS.Snow!Trojan Computer Associates Trojan.AppActXComp
JS_Snow.a Trend Micro Trojan.AppActXComp
VBS/SnowWhite McAfee Trojan.AppActXComp
Trojan.JS.Snow Kaspersky Trojan.AppActXComp
VBS_INOR.P Trend Micro Trojan.AppActXComp
Trojan-Dropper.VBS.Inor.ct Kaspersky Trojan.AppActXComp
VBS_INOR.AN Trend Micro Trojan.AppActXComp
VBS/Boxed.AX!Downloader Computer Associates Trojan.AppActXComp
Trojan.Webus.G Symantec Trojan.AppActXComp
VBS_INOR.Q Trend Micro Trojan.AppActXComp
JScript/StartPage.G!Trojan Computer Associates Trojan.AppActXComp
JS_IESTART.G Trend Micro Trojan.AppActXComp
VBS_INOR.AK Trend Micro Trojan.AppActXComp
VBS/Starter!Trojan Computer Associates Trojan.AppActXComp
VBS_STARTER.B Trend Micro Trojan.AppActXComp
VBS/Traxg!Worm Computer Associates Trojan.AppActXComp
HTML_TRAXG.A Trend Micro Trojan.AppActXComp
VBS/Antinap McAfee Trojan.AppActXComp
Trojan.VBS.Zapchast.b Kaspersky Trojan.AppActXComp
JS_SEEKER.X Trend Micro Trojan.AppActXComp
JScript/Offensive!Trojan Computer Associates Trojan.AppActXComp
HTML_Seeker.a10 Trend Micro Trojan.AppActXComp
JS/Offensive McAfee Trojan.AppActXComp
Trojan.JS.Offensive Symantec Trojan.AppActXComp
HTML_SEEKER.A10 Trend Micro Trojan.AppActXComp
Trojan.JS.Offensive Kaspersky Trojan.AppActXComp
JS_SEEKER.A2 Trend Micro Trojan.AppActXComp
VBS_RSCRIPT.GEN Trend Micro Trojan.AppActXComp
Trojan.JS.DeltreeY.c Kaspersky Trojan.AppActXComp
JScript/ExitWindows.C!Trojan Computer Associates Trojan.AppActXComp
JS_EXITW.A.DR Trend Micro Trojan.AppActXComp
JS.HTADropper Symantec Trojan.AppActXComp
JScript/WineVar!Exploit!Worm Computer Associates Trojan.AppActXComp
Email-Worm.Win32.Winevar Kaspersky Trojan.AppActXComp
JS_SHARENT.A Trend Micro Trojan.AppActXComp
JS/Sharent McAfee Trojan.AppActXComp
Virus.JS.ShareNT Kaspersky Trojan.AppActXComp
JS_RUNSCRIPT.C Trend Micro Trojan.AppActXComp
Trojan.JS.Freq.f Kaspersky Trojan.AppActXComp
JS_RUNSCRIPT.G Trend Micro Trojan.AppActXComp

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies