Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Skintrim.H aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.8021
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.258
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2651
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.669
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2714
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2713
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2586
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2590
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2690
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2853
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2633
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2873
Trojan:Win32/Skintrim.H Microsoft Trojan.Click.24543
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2711
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2705
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2709
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2673
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2784
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2783
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2782
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2780
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2712
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2806
Trojan:Win32/Skintrim.H Microsoft Trojan.Inject.5490
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2670
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2793
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2704
Trojan:Win32/Skintrim.H Microsoft Trojan.Siggen.3848
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2874
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2787
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2759
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2823
Trojan:Win32/Skintrim.H Microsoft Trojan.MulDrop.29493
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2655
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2656
Trojan:Win32/Skintrim.H Microsoft Trojan.DownLoad1.38552
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2864
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2699
Trojan:Win32/Skintrim.H Microsoft Trojan.PWS.Gamania.16845
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2695
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2697
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2632
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2634
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2583
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2594
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2626
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2676
Trojan:Win32/Skintrim.H Microsoft BackDoor.Siggen.388
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2832
Trojan:Win32/Skintrim.H Microsoft Trojan.Packed.2830

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.