Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Anomaly aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Anomaly Microsoft BackDoor.Mailbot
Trojan:Win32/Anomaly Microsoft Trojan.Gminji
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.2208
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.16448
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.31010
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.14632
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.16145
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.3627
Trojan:Win32/Anomaly Microsoft BackDoor.WinShell.50
Trojan:Win32/Anomaly Microsoft BackDoor.IRC.Sdbot.2585
Trojan:Win32/Anomaly Microsoft BackDoor.Huai.402
Trojan:Win32/Anomaly Microsoft BackDoor.Huai.966
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.7050
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.6643
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.9959
Trojan:Win32/Anomaly Microsoft BackDoor.BlackHole.2346
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.9960
Trojan:Win32/Anomaly Microsoft BackDoor.Huai.1322
Trojan:Win32/Anomaly Microsoft Trojan.PWS.Legmir.2025
Trojan:Win32/Anomaly Microsoft BackDoor.Servu.51
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.52503
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.6281
Trojan:Win32/Anomaly Microsoft BackDoor.ProRat.32
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.5418
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.1782
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.5231
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.14057
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.63521
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.7869
Trojan:Win32/Anomaly Microsoft Trojan.PWS.Lineage.2880
Trojan:Win32/Anomaly Microsoft BackDoor.Huai.2449
Trojan:Win32/Anomaly Microsoft Win32.HLLW.Autoruner.1199
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.13108
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.3066
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.9434
Trojan:Win32/Anomaly Microsoft BackDoor.BlackHole.2303
Trojan:Win32/Anomaly Microsoft BackDoor.BlackHole.2142
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.28136
Trojan:Win32/Anomaly Microsoft BackDoor.Pigeon.8521
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.63520
Trojan:Win32/Anomaly Microsoft BackDoor.Banito.3
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.59633
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.14404
Trojan:Win32/Anomaly Microsoft Exploit.Helpxsite
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.17090
Trojan:Win32/Anomaly Microsoft Trojan.MulDrop.13600
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.50681
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.35828
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.56243
Trojan:Win32/Anomaly Microsoft Trojan.DownLoader.63784

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.