Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Inject.HD aliases:

Name Vendor Dr.Web classification name
Trojan.Inject.HD BitDefender Win32.HLLM.Beagle.45057
Trojan.Inject.HD BitDefender BackDoor.Soo
Trojan.Inject.HD BitDefender BackDoor.ColdFusion.12
Trojan.Inject.HD BitDefender BackDoor.Rejoice
Trojan.Inject.HD BitDefender Trojan.KeyLogger.1049
Trojan.Inject.HD BitDefender Trojan.KeyLogger.1039
Trojan.Inject.HD BitDefender Trojan.PWS.Gamania.5171
Trojan.Inject.HD BitDefender BackDoor.Insti.65
Trojan.Inject.HD BitDefender BackDoor.Vidro
Trojan.Inject.HD BitDefender Trojan.DownLoader.14610
Trojan.Inject.HD BitDefender BackDoor.Bifrost.35
Trojan.Inject.HD BitDefender Trojan.MulDrop.899
Trojan.Inject.HD BitDefender BackDoor.Twin
Trojan.Inject.HD BitDefender Trojan.DownLoader.15852
Trojan.Inject.HD BitDefender BackDoor.Insti.133
Trojan.Inject.HD BitDefender Trojan.MulDrop.14792
Trojan.Inject.HD BitDefender Trojan.DownLoader.32247
Trojan.Inject.HD BitDefender Trojan.PWS.Legmir.43
Trojan.Inject.HD BitDefender Trojan.MulDrop.14080
Trojan.Inject.HD BitDefender Trojan.DownLoader.35140
Trojan.Inject.HD BitDefender Trojan.DownLoader.4046
Trojan.Inject.HD BitDefender Trojan.PWS.LDPinch.1494
Trojan.Inject.HD BitDefender Trojan.Proxy.473
Trojan.Inject.HD BitDefender Trojan.PWS.Lineage.4659
Trojan.Inject.HD BitDefender BackDoor.Utilman.11
Trojan.Inject.HD BitDefender Trojan.DownLoader.37248
Trojan.Inject.HD BitDefender Trojan.DownLoader.37244
Trojan.Inject.HD BitDefender Trojan.DownLoader.37238
Trojan.Inject.HD BitDefender Trojan.DownLoader.18714
Trojan.Inject.HD BitDefender Trojan.MulDrop.2054
Trojan.Inject.HD BitDefender BackDoor.Pigeon.12857
Trojan.Inject.HD BitDefender Trojan.KeyLogger.351
Trojan.Inject.HD BitDefender Trojan.KeyLogger.358
Trojan.Inject.HD BitDefender Trojan.KeyLogger.355
Trojan.Inject.HD BitDefender Trojan.KeyLogger.359
Trojan.Inject.HD BitDefender BackDoor.Dong
Trojan.Inject.HD BitDefender Trojan.MulDrop.6542
Trojan.Inject.HD BitDefender Trojan.MulDrop.2318
Trojan.Inject.HD BitDefender BackDoor.Pigeon.11362
Trojan.Inject.HD BitDefender Trojan.PWS.LDPinch.241
Trojan.Inject.HD BitDefender Trojan.MulDrop.1706
Trojan.Inject.HD BitDefender Trojan.PWS.Hert
Trojan.Inject.HD BitDefender Trojan.MulDrop.3258
Trojan.Inject.HD BitDefender Trojan.Update
Trojan.Inject.HD BitDefender Trojan.Rinsta
Trojan.Inject.HD BitDefender Trojan.KeyLogger.1757
Trojan.Inject.HD BitDefender Trojan.KeyLogger.1786
Trojan.Inject.HD BitDefender Trojan.DownLoader.54979
Trojan.Inject.HD BitDefender Trojan.MulDrop.11145
Trojan.Inject.HD BitDefender BackDoor.Pigeon.8357

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.