Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Starman aliases:

Name Vendor Dr.Web classification name
Trojan.Win32.Hrup.a Kaspersky Trojan.Starman
DR/Delphi.Gen Avira Trojan.Starman
Worm/Allaple.b.2 Avira Trojan.Starman
TROJ_Generic.SFB Trend Micro Trojan.Starman
Backdoor.Bot.103413 BitDefender Trojan.Starman
WORM_RBOT.EG Trend Micro Trojan.Starman
PSW.Generic2.YAM AVG Trojan.Starman
BDS/Radmin.J Avira Trojan.Starman
Trojan-Dropper.Win32.Delf.hf Kaspersky Trojan.Starman
Obfustat.QIW AVG Trojan.Starman
TROJ_GEN.7X0318S Trend Micro Trojan.Starman
Obfustat.QBU AVG Trojan.Starman
W32/Virut.b Avira Trojan.Starman
Trojan:Win32/Bumat!rts Microsoft Trojan.Starman
Win32/Expiro AVG Trojan.Starman
TROJ_Generic Trend Micro Trojan.Starman
BackDoor.Generic6.VMA AVG Trojan.Starman
Trojan.Generic.542882 BitDefender Trojan.Starman
Worm/Allaple.H AVG Trojan.Starman
TR/Agent.PY.2 Avira Trojan.Starman
BackDoor.Generic6.VFI AVG Trojan.Starman
Dropper.Small.17.AT AVG Trojan.Starman
BackDoor.Generic3.KOD AVG Trojan.Starman
BackDoor.Generic3.SEF AVG Trojan.Starman
IRC/BackDoor.SdBot2.KWD AVG Trojan.Starman
Backdoor.RBot.F BitDefender Trojan.Starman
BackDoor.Generic3.SEG AVG Trojan.Starman
BackDoor.Generic4.PMG AVG Trojan.Starman
TROJ_GEN.SFB Trend Micro Trojan.Starman
Obfustat.OBM AVG Trojan.Starman
BackDoor.Generic3.KVV AVG Trojan.Starman
BackDoor.Generic8.SDP AVG Trojan.Starman
BackDoor.Generic6.VEM AVG Trojan.Starman
W32/Expiro.B Avira Trojan.Starman
WORM_ALLAPLE.PF Trend Micro Trojan.Starman
Virus:Win32/Virut.gen!B Microsoft Trojan.Starman
BackDoor.Generic6.VMH AVG Trojan.Starman
BackDoor.Generic6.VKY AVG Trojan.Starman
Backdoor.Win32.Rbot.krg Kaspersky Trojan.Starman
Downloader.Tibs AVG Trojan.Starman
TR/Agent.PY.7 Avira Trojan.Starman
BDS/Allaple.A.1 Avira Trojan.Starman
BackDoor.Generic3.KKQ AVG Trojan.Starman
BackDoor.Generic3.KMH AVG Trojan.Starman
BDS/Allaple.A.126 Avira Trojan.Starman
BackDoor.Generic6.VHK AVG Trojan.Starman
TROJ_Gen.8V700 Trend Micro Trojan.Starman
W32/QQPass.worm McAfee Trojan.Starman
TR/Agent.PY.4 Avira Trojan.Starman
Trojan-Dropper.Win32.Agent.wy Kaspersky Trojan.Starman

1 2 3 4 5 6 7 8 9 10 11 12

Trojan.Starman in virus library:

Trojan.Starman.5196
Trojan.Starman.5197
Trojan.Starman.5198
Trojan.Starman.5199
Trojan.Starman.5200
Trojan.Starman.5201
Trojan.Starman.5202
Trojan.Starman.5203
Trojan.Starman.5204
Trojan.Starman.5205
Trojan.Starman.5206
Trojan.Starman.5207
Trojan.Starman.5208
Trojan.Starman.5209
Trojan.Starman.5210
Trojan.Starman.5211
Trojan.Starman.5212
Trojan.Starman.5213
Trojan.Starman.5214
Trojan.Starman.5215
Trojan.Starman.5216
Trojan.Starman.5217
Trojan.Starman.5218
Trojan.Starman.5219
Trojan.Starman.5220
Trojan.Starman.5221
Trojan.Starman.5222
Trojan.Starman.5223
Trojan.Starman.5224
Trojan.Starman.5225
Trojan.Starman.5226
Trojan.Starman.5227
Trojan.Starman.5228
Trojan.Starman.5229
Trojan.Starman.5230
Trojan.Starman.5231
Trojan.Starman.5232
Trojan.Starman.5233
Trojan.Starman.5234
Trojan.Starman.5235
Trojan.Starman.5236
Trojan.Starman.5237
Trojan.Starman.5238
Trojan.Starman.5239
Trojan.Starman.5240
Trojan.Starman.5241
Trojan.Starman.5242
Trojan.Starman.5243
Trojan.Starman.5244
Trojan.Starman.5245

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.