Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Small aliases:

Name Vendor Dr.Web classification name
Downloader.Small AVG Trojan.DownLoader.6882
Downloader.Small AVG Trojan.DownLoader.6484
Downloader.Small AVG Trojan.DownLoader.6210
Downloader.Small AVG Trojan.DownLoader.6552
Downloader.Small AVG Trojan.DownLoader.6418
Downloader.Small AVG BackDoor.Apex.11
Downloader.Small AVG Trojan.DownLoader.8242
Downloader.Small AVG Trojan.DownLoader.4491
Downloader.Small AVG Trojan.DownLoader.9886
Downloader.Small AVG Trojan.DownLoader.9885
Downloader.Small AVG Trojan.Aphex.81
Downloader.Small AVG Win32.HLLM.Beagle.45078
Downloader.Small AVG Win32.HLLM.Beagle.45077
Downloader.Small AVG Win32.HLLM.Beagle.45079
Downloader.Small AVG Win32.HLLM.Beagle.45080
Downloader.Small AVG Trojan.DownLoader.12209
Downloader.Small AVG Trojan.DownLoader.1914
Downloader.Small AVG Trojan.DownLoader.12364
Downloader.Small AVG Trojan.DownLoader.12365
Downloader.Small AVG Trojan.DownLoader.14419
Downloader.Small AVG Trojan.DownLoader.14960
Downloader.Small AVG Trojan.DownLoader.14962
Downloader.Small AVG Trojan.DownLoader.14993
Downloader.Small AVG Trojan.DownLoader.14961
Downloader.Small AVG Trojan.DownLoader.14956
Downloader.Small AVG Trojan.DownLoader.14963
Downloader.Small AVG Trojan.DownLoader.15535
Downloader.Small AVG Trojan.DownLoader.15667
Downloader.Small AVG Trojan.DownLoader.15767
Downloader.Small AVG Trojan.DownLoader.16567
Downloader.Small AVG Trojan.DownLoader.19752
Downloader.Small AVG Trojan.DownLoader.20210
Downloader.Small AVG Trojan.DownLoader.20209
Downloader.Small AVG Trojan.DownLoader.20678
Downloader.Small AVG Trojan.DownLoader.20685
Downloader.Small AVG Trojan.DownLoader.20675
Downloader.Small AVG Trojan.DownLoader.20693
Downloader.Small AVG Trojan.DownLoader.20799
Downloader.Small AVG Trojan.DownLoader.20470
Downloader.Small AVG Trojan.DownLoader.20360
Downloader.Small AVG Trojan.DownLoader.20309
Downloader.Small AVG Trojan.DownLoader.20533
Downloader.Small AVG Trojan.DownLoader.20447
Downloader.Small AVG Trojan.DownLoader.20404
Downloader.Small AVG Trojan.DownLoader.20357
Downloader.Small AVG Trojan.DownLoader.20342
Downloader.Small AVG Trojan.DownLoader.20353
Downloader.Small AVG Trojan.DownLoader.21085
Downloader.Small AVG Trojan.DownLoader.based
Downloader.Small AVG Trojan.DownLoader.1579

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.