Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.NSAnti.A aliases:

Name Vendor Dr.Web classification name
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.788
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.550
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.2254
Trojan.NSAnti.A BitDefender Trojan.Parmor
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.5057
Trojan.NSAnti.A BitDefender BackDoor.IRC.Sdbot.1881
Trojan.NSAnti.A BitDefender Trojan.DownLoader.58125
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.13413
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.669
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqrobber.279
Trojan.NSAnti.A BitDefender Trojan.DownLoader.15746
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.1559
Trojan.NSAnti.A BitDefender Trojan.MulDrop.9434
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.664
Trojan.NSAnti.A BitDefender Trojan.DownLoader.13450
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.83
Trojan.NSAnti.A BitDefender Trojan.PWS.Spywoool
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqrobber.228
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.805
Trojan.NSAnti.A BitDefender Trojan.PWS.Pingma
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqrobber.47
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.146
Trojan.NSAnti.A BitDefender Trojan.PWS.Gamania.9136
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.346
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.212
Trojan.Nsanti.A BitDefender BackDoor.Graybird
Trojan.NSAnti.A BitDefender Trojan.DownLoader.3692
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.12933
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqrobber.146
Trojan.NSAnti.A BitDefender Trojan.PWS.Legmir.847
Trojan.NSAnti.A BitDefender Trojan.DownLoader.18720
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqpass.1263
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.729
Trojan.NSAnti.A BitDefender BackDoor.IRC.Sdbot.2425
Trojan.NSAnti.A BitDefender Trojan.MulDrop.5075
Trojan.NSAnti.A BitDefender Trojan.MulDrop.3087
Trojan.NSAnti.A BitDefender Trojan.MulDrop.8149
Trojan.NSAnti.A BitDefender Trojan.DownLoader.2791
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.173
Trojan.NSAnti.A BitDefender Trojan.PWS.Legmir.1881
Trojan.NSAnti.A BitDefender BackDoor.Rejoice
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.1613
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.1535
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.357
Trojan.NSAnti.A BitDefender Trojan.DownLoader.33427
Trojan.NSAnti.A BitDefender Trojan.PWS.Qqpass
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.857
Trojan.NSAnti.A BitDefender BackDoor.Pigeon.24407
Trojan.NSAnti.A BitDefender BackDoor.Bifrost.74
Trojan.NSAnti.A BitDefender Trojan.MulDrop.3109

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.