Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Injector.AF aliases:

Name Vendor Dr.Web classification name
Trojan.Injector.AF BitDefender Trojan.MulDrop.3130
Trojan.Injector.AF BitDefender Trojan.DownLoader.50961
Trojan.Injector.AF BitDefender Trojan.MulDrop.3950
Trojan.Injector.AF BitDefender Trojan.MulDrop.6097
Trojan.Injector.AF BitDefender BackDoor.Swz
Trojan.Injector.AF BitDefender Trojan.MulDrop.4167
Trojan.Injector.AF BitDefender Trojan.MulDrop.9421
Trojan.Injector.AF BitDefender Trojan.PWS.Sable
Trojan.Injector.AF BitDefender Trojan.MulDrop.12497
Trojan.Injector.AF BitDefender Trojan.MulDrop.14937
Trojan.Injector.AF BitDefender Trojan.MulDrop.11878
Trojan.Injector.AF BitDefender Trojan.MulDrop.3949
Trojan.Injector.AF BitDefender Trojan.PWS.Frep
Trojan.Injector.AF BitDefender Trojan.DownLoader.42741
Trojan.Injector.AF BitDefender Trojan.MulDrop.4662
Trojan.Injector.AF BitDefender Trojan.MulDrop.8354
Trojan.Injector.AF BitDefender Trojan.DownLoader.31253
Trojan.Injector.AF BitDefender Trojan.DownLoader.31238
Trojan.Injector.AF BitDefender Trojan.MulDrop.4296
Trojan.Injector.AF BitDefender Trojan.PWS.LDPinch.3227
Trojan.Injector.AF BitDefender Trojan.PWS.Zhengtu
Trojan.Injector.AF BitDefender Trojan.MulDrop.18392
Trojan.Injector.AF BitDefender Trojan.MulDrop.18429
Trojan.Injector.AF BitDefender Trojan.MulDrop.18408
Trojan.Injector.AF BitDefender Trojan.WMSteal
Trojan.Injector.AF BitDefender BackDoor.Sakl
Trojan.Injector.AF BitDefender Trojan.DownLoader.33942
Trojan.Injector.AF BitDefender Trojan.Hown
Trojan.Injector.AF BitDefender Trojan.PWS.LDPinch.870
Trojan.Injector.AF BitDefender Trojan.PWS.Legmir.2026
Trojan.Injector.AF BitDefender Trojan.PWS.Tanspy.1251
Trojan.Injector.AF BitDefender Trojan.MulDrop.10440
Trojan.Injector.AF BitDefender Trojan.MulDrop.10478
Trojan.Injector.AF BitDefender Trojan.MulDrop.6559
Trojan.Injector.AF BitDefender Trojan.MulDrop.6585
Trojan.Injector.AF BitDefender Trojan.MulDrop.6024
Trojan.Injector.AF BitDefender BackDoor.IRC.Sdbot.3840
Trojan.Injector.AF BitDefender BackDoor.IRC.Sdbot.3067
Trojan.Injector.AF BitDefender Trojan.MulDrop.11106
Trojan.Injector.AF BitDefender Trojan.MulDrop.17155
Trojan.Injector.AF BitDefender Trojan.MulDrop.12378
Trojan.Injector.AF BitDefender Tool.MessenPass
Trojan.Injector.AF BitDefender Trojan.Inject.2025
Trojan.Injector.AF BitDefender Trojan.DownLoad.45
Trojan.Injector.AF BitDefender Trojan.DownLoader.31419
Trojan.Injector.AF BitDefender Trojan.DownLoader.31249
Trojan.Injector.AF BitDefender Trojan.DownLoader.20986
Trojan.Injector.AF BitDefender Trojan.PWS.Zhengtu.253
Trojan.Injector.AF BitDefender Trojan.MulDrop.7169
Trojan.Injector.AF BitDefender Trojan.MulDrop.9197

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.