Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Lineage.Variant!Trojan aliases:

Name Vendor Dr.Web classification name
Win32/Lineage.Variant!Trojan Computer Associates Trojan.DownLoader.4709
Win32/Lineage.Variant!Trojan Computer Associates Trojan.MulDrop.2791
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.427
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Gamefs
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.358
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.422
Win32/Lineage.Variant!Trojan Computer Associates BackDoor.Hehe.34
Win32/Lineage.Variant!Trojan Computer Associates Trojan.MulDrop.2182
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.245
Win32/Lineage.Variant!Trojan Computer Associates Trojan.Juwo
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.234
Win32/Lineage.Variant!Trojan Computer Associates Trojan.DownLoader.4301
Win32/Lineage.Variant!Trojan Computer Associates Trojan.MulDrop.1503
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.322
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.370
Win32/Lineage.Variant!Trojan Computer Associates Win32.HLLC.Relax
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.369
Win32/Lineage.Variant!Trojan Computer Associates Trojan.DownLoader.4334
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.353
Win32/Lineage.Variant!Trojan Computer Associates Trojan.Proxy.307
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Warcraft
Win32/Lineage.Variant!Trojan Computer Associates Trojan.MulDrop.2389
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Hangame
Win32/Lineage.Variant!Trojan Computer Associates Trojan.MulDrop.2806
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.256
Win32/Lineage.Variant!Trojan Computer Associates Trojan.MulDrop.3127
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Fox
Win32/Lineage.Variant!Trojan Computer Associates Trojan.Sohu
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Foxmir
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Vipgsm
Win32/Lineage.Variant!Trojan Computer Associates Trojan.MulDrop.2807
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.382
Win32/Lineage.Variant!Trojan Computer Associates BackDoor.Ipamor
Win32/Lineage.Variant!Trojan Computer Associates BackDoor.Tapican
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Qqgame
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Fox
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Lineage
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Lineage
Win32/Lineage.Variant!Trojan Computer Associates Exploit.CodeBase
Win32/Lineage.Variant!Trojan Computer Associates Trojan.PWS.Legmir.249
Win32/Lineage.Variant!Trojan E-Trust Trojan.MulDrop.3304
Win32/Lineage.Variant!Trojan E-Trust Trojan.MulDrop.3364
Win32/Lineage.Variant!Trojan E-Trust Trojan.MulDrop.3446
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Legmir
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Qqgame
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Legmir.130
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Vipgsm
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Mgame
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Gamania
Win32/Lineage.Variant!Trojan E-Trust Trojan.PWS.Legmir.178

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.