Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BScope.Trojan-Dropper.Pict.62314 aliases:

Name Vendor Dr.Web classification name
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55088
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.53461
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda BackDoor.IRC.Sdbot.4922
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Adware.QQHelp.704
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.3718
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55277
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55456
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55239
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55488
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.11527
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.29810
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.3808
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39538
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.57882
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55408
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39622
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39578
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39551
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39606
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.56282
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.StartPage.20923
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.3685
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.811
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.PWS.Finanz
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Adware.QQHelp.747
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.14891
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.688
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.651
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.13118
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.49464
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.51201
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.51087
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.50238
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.50239
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda BackDoor.Poison.767
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.58285
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.111
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Adware.QQHelp.587
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55268
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.14885
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.14845
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Adware.QQHelp.691
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.14889
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.14892
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Cipher.136
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.14840
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.10455
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.130
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.129

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.