Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanSpy:Win32/Logsnif.gen aliases:

Name Vendor Dr.Web classification name
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.DownLoader.7465
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.3037
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.343
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.IRC.Sdbot.2167
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Paziruk
TrojanSpy:Win32/Logsnif.gen Microsoft Win32.HLLW.Mistri.25
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.647
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.7079
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.697
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Slh
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.211
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.3636
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Shizzle
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Bandito.123
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Utilman.11
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Outbreak.24
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.346
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.790
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Biorante
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.IRC.Sdbot.1881
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Knopp
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.KeyLogger.1992
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.DownLoader.46967
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.MulDrop.3130
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.1883
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.KeyLogger.2216
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.IRC.Sdbot.2100
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.6581
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.IRC.Sdbot.2926
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.IRC.Sdbot.2274
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Outbreak.38
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.MulDrop.4111
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.MulDrop.2990
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.MulDrop.4265
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.MulDrop.4510
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.478
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.MulDrop.13031
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.DownLoader.28527
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.952
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.PWS.Sable
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Inge
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.DownLoader.48978
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.5547
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.5435
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.MulDrop.3942
TrojanSpy:Win32/Logsnif.gen Microsoft Trojan.PWS.Bofuh.5
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.4972
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.5321
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.4732
TrojanSpy:Win32/Logsnif.gen Microsoft BackDoor.Pigeon.4828

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.