Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

CHM_DROPPER.CLN aliases:

Name Vendor Dr.Web classification name
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.2148
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.2189
CHM_DROPPER.CLN Trend Micro Trojan.PWS.Lineage
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.2227
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.2149
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.2153
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1326
CHM_DROPPER.CLN Trend Micro Dialer.Silent
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.929
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1259
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1263
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1265
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1261
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1256
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1264
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1260
CHM_DROPPER.CLN Trend Micro Trojan.StartPage.384
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.912
CHM_DROPPER.CLN Trend Micro Trojan.PWS.QQDragon
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1636
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1615
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1614
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1594
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1682
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1592
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1593
CHM_DROPPER.CLN Trend Micro Trojan.StartPage.916
CHM_DROPPER.CLN Trend Micro Trojan.PWS.Qqrobber.19
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.2522
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.2349
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1724
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.2312
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.2985
CHM_DROPPER.CLN Trend Micro Trojan.StartPage.553
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.613
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.991
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1365
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1382
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1347
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1381
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1339
CHM_DROPPER.CLN Trend Micro Trojan.PWS.Legmir.50
CHM_DROPPER.CLN Trend Micro Trojan.PWS.Gamecl
CHM_DROPPER.CLN Trend Micro Trojan.StartPage.790
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1837
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.1333
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.421
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1422
CHM_DROPPER.CLN Trend Micro Trojan.MulDrop.1513
CHM_DROPPER.CLN Trend Micro Trojan.DownLoader.571

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.