Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BScope.Trojan-Dropper.Inject aliases:

Name Vendor Dr.Web classification name
BScope.Trojan-Dropper.Inject VirusBlokAda BackDoor.Pigeon.173
BScope.Trojan-Dropper.Inject VirusBlokAda BackDoor.Pigeon.83
BScope.Trojan-Dropper.Inject VirusBlokAda BackDoor.IRC.Sdbot.1881
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.Inject.290
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.Inject.114
BScope.Trojan-Dropper.Inject VirusBlokAda BackDoor.Pigeon.13413
BScope.Trojan-Dropper.Inject VirusBlokAda Win32.HLLM.Rancheg
BScope.Trojan-Dropper.Inject VirusBlokAda BackDoor.Bifrost
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.GoldSpy
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.MulDrop.10012
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.DownLoader.55649
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.Inject.566
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.MulDrop.9781
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.2387
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.Packed.229
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.2358
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.2597
BScope.Trojan-Dropper.Inject VirusBlokAda Win32.HLLW.Autoruner.963
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Reggin
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Gamania.5746
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1898
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.DownLoader.37259
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Gamania.6907
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Gamania.6974
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Gamania.5677
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Gamania.5903
BScope.Trojan-Dropper.Inject VirusBlokAda Win32.HLLW.Autoruner.6019
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1727
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.2059
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1728
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1725
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1717
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1715
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.10239
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.DownLoader.56960
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.2053
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.DownLoader.36243
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1644
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1645
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.DownLoader.36749
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1850
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1647
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1716
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1655
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1723
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Wsgame.1738
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.PWS.Qqpass.505
BScope.Trojan-Dropper.Inject VirusBlokAda BackDoor.RShell
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.MulDrop.2727
BScope.Trojan-Dropper.Inject VirusBlokAda Trojan.Starter.514

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.