Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BScope.Trojan-Dropper.Pict.62314 aliases:

Name Vendor Dr.Web classification name
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39592
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39607
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39612
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39613
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39530
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39576
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39639
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39619
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39581
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.53683
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39591
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39620
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55257
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Adware.QQHelp.715
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.PWS.Finanz.200
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda BackDoor.IRC.LiarBot
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.53465
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.49094
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.59225
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.12932
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda BackDoor.Bifrost.8
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.55248
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.8179
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.12957
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Adware.QQHelp.714
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.72
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.3708
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.12934
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.56546
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39621
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39618
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39624
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39575
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoad.39614
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Siggen.63350
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.12964
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.56551
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.105
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda BackDoor.Iam.7
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Adware.QQHelp.578
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.57627
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.56661
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.12958
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.37953
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.221
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.MulDrop.14943
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.86
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.Qqthree.112
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.StartPage.21194
BScope.Trojan-Dropper.Pict.62314 VirusBlokAda Trojan.DownLoader.47335

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.