Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Starman aliases:

Name Vendor Dr.Web classification name
Worm/Allaple.B AVG Trojan.Starman
Win32/Virut.A AVG Trojan.Starman
Net-Worm.Win32.Allaple.e Kaspersky Trojan.Starman
Win32/Mallar.K E-Trust Trojan.Starman
WORM_ALLAPLE.B Trend Micro Trojan.Starman
WORM_ALLAPLE.A Trend Micro Trojan.Starman
Win32/Mallar.L E-Trust Trojan.Starman
Worm/Allaple.E AVG Trojan.Starman
Win32.Virut.A BitDefender Trojan.Starman
W32/EmailWorm.GVD F-Prot Trojan.Starman
Trojan.Peed.Gen BitDefender Trojan.Starman
Win32/Mallar E-Trust Trojan.Starman
W32/Trojan.AAZM F-Prot Trojan.Starman
Trojan.Win32.Obfuscated.bv Kaspersky Trojan.Starman
W32/NetWorm.DV F-Prot Trojan.Starman
Worm/Allaple.D AVG Trojan.Starman
WORM_Generic Trend Micro Trojan.Starman
W32/NetWorm.A F-Prot Trojan.Starman
W32/NetWorm.AD F-Prot Trojan.Starman
W32/Allaple.A F-Prot Trojan.Starman
Worm/Generic.AEE AVG Trojan.Starman
W32/EmailWorm.AMV F-Prot Trojan.Starman
Net-Worm.Win32.Allaple.d Kaspersky Trojan.Starman
W32/NetWorm.EL F-Prot Trojan.Starman
Worm.Allaple.B BitDefender Trojan.Starman
W32/EmailWorm.AMU F-Prot Trojan.Starman
Worm/Generic.AEF AVG Trojan.Starman
W32/Trojan.AAZI F-Prot Trojan.Starman
W32/Allaple.B F-Prot Trojan.Starman
W32/Endom.B F-Prot Trojan.Starman
Worm/Generic.APQ AVG Trojan.Starman
W32/EmailWorm.HQK F-Prot Trojan.Starman
Worm/Generic.APR AVG Trojan.Starman
W32/NetWorm.AN F-Prot Trojan.Starman
W32/NetWorm.FU F-Prot Trojan.Starman
Worm/Generic.AND AVG Trojan.Starman
Net-Worm.Win32.Allaple.f Kaspersky Trojan.Starman
W32/EmailWorm.AMX F-Prot Trojan.Starman
WORM_ALLAPLE.IK Trend Micro Trojan.Starman
Backdoor.Radmin.J BitDefender Trojan.Starman
Win32/Badmin.O E-Trust Trojan.Starman
Backdoor.Win32.RAdmin.j Kaspersky Trojan.Starman
Win32/Mallar.U E-Trust Trojan.Starman
Backdoor.RAdmin.J BitDefender Trojan.Starman
Agent.DYT AVG Trojan.Starman
Worm.Allaple.I BitDefender Trojan.Starman
Generic.Malware.SWX!g.8D214053 BitDefender Trojan.Starman
WORM_ALLAPLE.IP Trend Micro Trojan.Starman
W32/CrazyCrunch-based!Maximus F-Prot Trojan.Starman
Win32/Mallar.T E-Trust Trojan.Starman

1 2 3 4 5 6 7 8 9 10 11 12

Trojan.Starman in virus library:

Trojan.Starman.5246
Trojan.Starman.5247
Trojan.Starman.5248
Trojan.Starman.5249
Trojan.Starman.5250
Trojan.Starman.5251
Trojan.Starman.5252
Trojan.Starman.5253
Trojan.Starman.5254
Trojan.Starman.5255
Trojan.Starman.5256
Trojan.Starman.5257
Trojan.Starman.5258
Trojan.Starman.5259
Trojan.Starman.5260
Trojan.Starman.5261
Trojan.Starman.5262
Trojan.Starman.5263
Trojan.Starman.5264
Trojan.Starman.5265
Trojan.Starman.5266
Trojan.Starman.5267
Trojan.Starman.5268
Trojan.Starman.5269
Trojan.Starman.5270
Trojan.Starman.5271
Trojan.Starman.5272
Trojan.Starman.5273
Trojan.Starman.5274
Trojan.Starman.5275
Trojan.Starman.5276
Trojan.Starman.5277
Trojan.Starman.5278
Trojan.Starman.5279
Trojan.Starman.5280
Trojan.Starman.5281
Trojan.Starman.5282
Trojan.Starman.5283
Trojan.Starman.5284
Trojan.Starman.5285
Trojan.Starman.5286
Trojan.Starman.5287
Trojan.Starman.5288
Trojan.Starman.5289
Trojan.Starman.5290
Trojan.Starman.5291
Trojan.Starman.5292
Trojan.Starman.5293
Trojan.Starman.5294
Trojan.Starman.5295

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.