Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Logsnif aliases:

Name Vendor Dr.Web classification name
Win32/Logsnif Microsoft Trojan.DownLoader.13920
Win32/Logsnif Microsoft Trojan.PWS.Cip
Win32/Logsnif Microsoft BackDoor.Pigeon.9413
Win32/Logsnif Microsoft BackDoor.Pigeon.9421
Win32/Logsnif Microsoft BackDoor.Utilman.11
Win32/Logsnif Microsoft Trojan.MulDrop.4307
Win32/Logsnif Microsoft Trojan.StartPage.20664
Win32/Logsnif Microsoft BackDoor.Pigeon.6581
Win32/Logsnif Microsoft Trojan.DownLoader.7059
Win32/Logsnif Microsoft BackDoor.Pigeon.9418
Win32/Logsnif Microsoft Trojan.KillFiles.472
Win32/Logsnif Microsoft Trojan.Hosts
Win32/Logsnif Microsoft Trojan.MulDrop.6964
Win32/Logsnif Microsoft Trojan.DownLoader.10413
Win32/Logsnif Microsoft Trojan.DownLoader.10421
Win32/Logsnif Microsoft Trojan.PWS.Banker.2716
Win32/Logsnif Microsoft Trojan.PWS.Banker.3115
Win32/Logsnif Microsoft BackDoor.Pigeon.9968
Win32/Logsnif Microsoft BackDoor.Pigeon.585
Win32/Logsnif Microsoft Trojan.DownLoader.49159
Win32/Logsnif Microsoft BackDoor.Slh
Win32/Logsnif Microsoft BackDoor.Pigeon.5317
Win32/Logsnif Microsoft BackDoor.Twenty
Win32/Logsnif Microsoft BackDoor.Pigeon.6216
Win32/Logsnif Microsoft BackDoor.Inge
Win32/Logsnif Microsoft BackDoor.IRC.Sdbot.3239
Win32/Logsnif Microsoft Trojan.MulDrop.1556
Win32/Logsnif Microsoft Program.AbsoluteKeylogger
Win32/Logsnif Microsoft Trojan.DownLoader.16150
Win32/Logsnif Microsoft Trojan.DownLoader.16370
Win32/Logsnif Microsoft BackDoor.Pigeon.8609
Win32/Logsnif Microsoft BackDoor.IRC.Sdbot.1881
Win32/Logsnif Microsoft BackDoor.Netshadow
Win32/Logsnif Microsoft Trojan.Starter.240
Win32/Logsnif Microsoft Trojan.DownLoader.14718
Win32/Logsnif Microsoft Trojan.PWS.Higgy
Win32/Logsnif Microsoft Win32.HLLW.Bla.5
Win32/Logsnif Microsoft Trojan.Elispy
Win32/Logsnif Microsoft Trojan.MulDrop.7879
Win32/Logsnif Microsoft BackDoor.Graybird
Win32/Logsnif Microsoft Trojan.PWS.Banker.2557
Win32/Logsnif Microsoft BackDoor.Rejoice
Win32/Logsnif Microsoft Trojan.KeyLogger.253
Win32/Logsnif Microsoft BackDoor.Huai.1613
Win32/Logsnif Microsoft BackDoor.Pigeon.9420
Win32/Logsnif Microsoft Trojan.Xyzen
Win32/Logsnif Microsoft BackDoor.IRC.Deflt
Win32/Logsnif Microsoft Trojan.MulDrop.3307
Win32/Logsnif Microsoft Trojan.MulDrop.3303
Win32/Logsnif Microsoft BackDoor.IRC.Sdbot.2949

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.