Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Starman aliases:

Name Vendor Dr.Web classification name
Worm/Allaple.B AVG Trojan.Starman
Win32/Virut.A AVG Trojan.Starman
Net-Worm.Win32.Allaple.e Kaspersky Trojan.Starman
Win32/Mallar.K E-Trust Trojan.Starman
WORM_ALLAPLE.B Trend Micro Trojan.Starman
WORM_ALLAPLE.A Trend Micro Trojan.Starman
Win32/Mallar.L E-Trust Trojan.Starman
Worm/Allaple.E AVG Trojan.Starman
Win32.Virut.A BitDefender Trojan.Starman
W32/EmailWorm.GVD F-Prot Trojan.Starman
Trojan.Peed.Gen BitDefender Trojan.Starman
Win32/Mallar E-Trust Trojan.Starman
W32/Trojan.AAZM F-Prot Trojan.Starman
Trojan.Win32.Obfuscated.bv Kaspersky Trojan.Starman
W32/NetWorm.DV F-Prot Trojan.Starman
Worm/Allaple.D AVG Trojan.Starman
WORM_Generic Trend Micro Trojan.Starman
W32/NetWorm.A F-Prot Trojan.Starman
W32/NetWorm.AD F-Prot Trojan.Starman
W32/Allaple.A F-Prot Trojan.Starman
Worm/Generic.AEE AVG Trojan.Starman
W32/EmailWorm.AMV F-Prot Trojan.Starman
Net-Worm.Win32.Allaple.d Kaspersky Trojan.Starman
W32/NetWorm.EL F-Prot Trojan.Starman
Worm.Allaple.B BitDefender Trojan.Starman
W32/EmailWorm.AMU F-Prot Trojan.Starman
Worm/Generic.AEF AVG Trojan.Starman
W32/Trojan.AAZI F-Prot Trojan.Starman
W32/Allaple.B F-Prot Trojan.Starman
W32/Endom.B F-Prot Trojan.Starman
Worm/Generic.APQ AVG Trojan.Starman
W32/EmailWorm.HQK F-Prot Trojan.Starman
Worm/Generic.APR AVG Trojan.Starman
W32/NetWorm.AN F-Prot Trojan.Starman
W32/NetWorm.FU F-Prot Trojan.Starman
Worm/Generic.AND AVG Trojan.Starman
Net-Worm.Win32.Allaple.f Kaspersky Trojan.Starman
W32/EmailWorm.AMX F-Prot Trojan.Starman
WORM_ALLAPLE.IK Trend Micro Trojan.Starman
Backdoor.Radmin.J BitDefender Trojan.Starman
Win32/Badmin.O E-Trust Trojan.Starman
Backdoor.Win32.RAdmin.j Kaspersky Trojan.Starman
Win32/Mallar.U E-Trust Trojan.Starman
Backdoor.RAdmin.J BitDefender Trojan.Starman
Agent.DYT AVG Trojan.Starman
Worm.Allaple.I BitDefender Trojan.Starman
Generic.Malware.SWX!g.8D214053 BitDefender Trojan.Starman
WORM_ALLAPLE.IP Trend Micro Trojan.Starman
W32/CrazyCrunch-based!Maximus F-Prot Trojan.Starman
Win32/Mallar.T E-Trust Trojan.Starman

1 2 3 4 5 6 7 8 9 10 11 12

Trojan.Starman in virus library:

Trojan.Starman.4784
Trojan.Starman.4785
Trojan.Starman.4786
Trojan.Starman.4787
Trojan.Starman.4788
Trojan.Starman.4789
Trojan.Starman.4790
Trojan.Starman.4791
Trojan.Starman.4792
Trojan.Starman.4793
Trojan.Starman.4794
Trojan.Starman.4795
Trojan.Starman.4796
Trojan.Starman.4798
Trojan.Starman.4799
Trojan.Starman.4800
Trojan.Starman.4801
Trojan.Starman.4802
Trojan.Starman.4803
Trojan.Starman.4805
Trojan.Starman.4806
Trojan.Starman.4807
Trojan.Starman.4808
Trojan.Starman.4809
Trojan.Starman.4810
Trojan.Starman.4814
Trojan.Starman.4815
Trojan.Starman.4816
Trojan.Starman.4817
Trojan.Starman.4818
Trojan.Starman.4819
Trojan.Starman.4820
Trojan.Starman.4821
Trojan.Starman.4822
Trojan.Starman.4824
Trojan.Starman.4826
Trojan.Starman.4829
Trojan.Starman.4830
Trojan.Starman.4831
Trojan.Starman.4832
Trojan.Starman.4834
Trojan.Starman.4835
Trojan.Starman.4837
Trojan.Starman.4867
Trojan.Starman.4870
Trojan.Starman.4871
Trojan.Starman.4872
Trojan.Starman.4873
Trojan.Starman.4874
Trojan.Starman.4876

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.