Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Starman aliases:

Name Vendor Dr.Web classification name
Worm/Allaple.B AVG Trojan.Starman
Win32/Virut.A AVG Trojan.Starman
Net-Worm.Win32.Allaple.e Kaspersky Trojan.Starman
Win32/Mallar.K E-Trust Trojan.Starman
WORM_ALLAPLE.B Trend Micro Trojan.Starman
WORM_ALLAPLE.A Trend Micro Trojan.Starman
Win32/Mallar.L E-Trust Trojan.Starman
Worm/Allaple.E AVG Trojan.Starman
Win32.Virut.A BitDefender Trojan.Starman
W32/EmailWorm.GVD F-Prot Trojan.Starman
Trojan.Peed.Gen BitDefender Trojan.Starman
Win32/Mallar E-Trust Trojan.Starman
W32/Trojan.AAZM F-Prot Trojan.Starman
Trojan.Win32.Obfuscated.bv Kaspersky Trojan.Starman
W32/NetWorm.DV F-Prot Trojan.Starman
Worm/Allaple.D AVG Trojan.Starman
WORM_Generic Trend Micro Trojan.Starman
W32/NetWorm.A F-Prot Trojan.Starman
W32/NetWorm.AD F-Prot Trojan.Starman
W32/Allaple.A F-Prot Trojan.Starman
Worm/Generic.AEE AVG Trojan.Starman
W32/EmailWorm.AMV F-Prot Trojan.Starman
Net-Worm.Win32.Allaple.d Kaspersky Trojan.Starman
W32/NetWorm.EL F-Prot Trojan.Starman
Worm.Allaple.B BitDefender Trojan.Starman
W32/EmailWorm.AMU F-Prot Trojan.Starman
Worm/Generic.AEF AVG Trojan.Starman
W32/Trojan.AAZI F-Prot Trojan.Starman
W32/Allaple.B F-Prot Trojan.Starman
W32/Endom.B F-Prot Trojan.Starman
Worm/Generic.APQ AVG Trojan.Starman
W32/EmailWorm.HQK F-Prot Trojan.Starman
Worm/Generic.APR AVG Trojan.Starman
W32/NetWorm.AN F-Prot Trojan.Starman
W32/NetWorm.FU F-Prot Trojan.Starman
Worm/Generic.AND AVG Trojan.Starman
Net-Worm.Win32.Allaple.f Kaspersky Trojan.Starman
W32/EmailWorm.AMX F-Prot Trojan.Starman
WORM_ALLAPLE.IK Trend Micro Trojan.Starman
Backdoor.Radmin.J BitDefender Trojan.Starman
Win32/Badmin.O E-Trust Trojan.Starman
Backdoor.Win32.RAdmin.j Kaspersky Trojan.Starman
Win32/Mallar.U E-Trust Trojan.Starman
Backdoor.RAdmin.J BitDefender Trojan.Starman
Agent.DYT AVG Trojan.Starman
Worm.Allaple.I BitDefender Trojan.Starman
Generic.Malware.SWX!g.8D214053 BitDefender Trojan.Starman
WORM_ALLAPLE.IP Trend Micro Trojan.Starman
W32/CrazyCrunch-based!Maximus F-Prot Trojan.Starman
Win32/Mallar.T E-Trust Trojan.Starman

1 2 3 4 5 6 7 8 9 10 11 12

Trojan.Starman in virus library:

Trojan.Starman.4115
Trojan.Starman.4129
Trojan.Starman.4253
Trojan.Starman.4280
Trojan.Starman.4304
Trojan.Starman.4523
Trojan.Starman.4531
Trojan.Starman.4532
Trojan.Starman.4541
Trojan.Starman.4652
Trojan.Starman.4668
Trojan.Starman.4671
Trojan.Starman.4735
Trojan.Starman.4736
Trojan.Starman.4737
Trojan.Starman.4739
Trojan.Starman.4740
Trojan.Starman.4744
Trojan.Starman.4745
Trojan.Starman.4746
Trojan.Starman.4747
Trojan.Starman.4752
Trojan.Starman.4753
Trojan.Starman.4754
Trojan.Starman.4755
Trojan.Starman.4756
Trojan.Starman.4757
Trojan.Starman.4758
Trojan.Starman.4759
Trojan.Starman.4760
Trojan.Starman.4761
Trojan.Starman.4762
Trojan.Starman.4763
Trojan.Starman.4764
Trojan.Starman.4765
Trojan.Starman.4766
Trojan.Starman.4767
Trojan.Starman.4768
Trojan.Starman.4769
Trojan.Starman.4772
Trojan.Starman.4774
Trojan.Starman.4775
Trojan.Starman.4776
Trojan.Starman.4777
Trojan.Starman.4778
Trojan.Starman.4779
Trojan.Starman.4780
Trojan.Starman.4781
Trojan.Starman.4782
Trojan.Starman.4783

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.