Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.NSAnti.A aliases:

Name Vendor Dr.Web classification name
Trojan.NSAnti.A BitDefender Trojan.PWS.Poptang
Trojan.NSAnti.A BitDefender Tool.IPCcrack
Trojan.NSAnti.A BitDefender BackDoor.IRC.Tongbot
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.38
Trojan.NSAnti.A BitDefender BackDoor.HackDef.134
Trojan.NSAnti.A BitDefender BackDoor.Hackdoor
Trojan.NSAnti.A BitDefender BackDoor.Hezi
Trojan.NSAnti.A BitDefender BackDoor.PcClient
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.149
Trojan.NSAnti.A BitDefender Trojan.PWS.Lineage
Trojan.NSAnti.A BitDefender BackDoor.Bifrost
Trojan.NSAnti.A BitDefender BackDoor.HackDef.167
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.106
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.72
Trojan.NSAnti.A BitDefender BackDoor.Gina
Trojan.NSAnti.A BitDefender Tool.TcpScan
Trojan.NSAnti.A BitDefender Trojan.PWS.Wool
Trojan.NSAnti.A BitDefender Trojan.DownLoader.7203
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.128
Trojan.NSAnti.A BitDefender Trojan.StartPage.1264
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqrobber.55
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.35
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.208
Trojan.NSAnti.A BitDefender Trojan.PWS.Legmir.487
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.210
Trojan.NSAnti.A BitDefender Trojan.Vanti
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqrobber.63
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.218
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqshou
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.36
Trojan.NSAnti.A BitDefender Trojan.DownLoader.3725
Trojan.NSAnti.A BitDefender Trojan.DownLoader.5747
Trojan.NSAnti.A BitDefender Trojan.KeyLogger.316
Trojan.NSAnti.A BitDefender BackDoor.PSClient
Trojan.NSAnti.A BitDefender Trojan.PWS.Legmir.386
Trojan.NSAnti.A BitDefender BackDoor.Fport
Trojan.NSAnti.A BitDefender Trojan.DownLoader.5196
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.221
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqrobber.28
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.223
Trojan.NSAnti.A BitDefender Trojan.Huax
Trojan.NSAnti.A BitDefender Trojan.DownLoader.7059
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.215
Trojan.NSAnti.A BitDefender Trojan.Inject.89
Trojan.NSAnti.A BitDefender Trojan.DownLoader.9845
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.253
Trojan.NSAnti.A BitDefender Trojan.DownLoader.9915
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.225
Trojan.NSAnti.A BitDefender Trojan.MulDrop.3802
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.268

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.