FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Dropper.Small aliases:

Name Vendor Dr.Web classification name
Dropper.Small AVG Trojan.MulDrop.2054
Dropper.Small AVG Trojan.MulDrop.1205
Dropper.Small AVG Trojan.MulDrop.3810
Dropper.Small AVG Trojan.DownLoader.1127
Dropper.Small AVG Trojan.MulDrop.3991
Dropper.Small AVG BackDoor.Agent
Dropper.Small AVG Trojan.DownLoader.4268
Dropper.Small AVG Trojan.MulDrop.6403
Dropper.Small AVG Trojan.MulDrop.6404
Dropper.Small AVG Trojan.MulDrop.6384
Dropper.Small AVG Trojan.MulDrop.6374
Dropper.Small AVG Trojan.MulDrop.6958
Dropper.Small AVG Trojan.MulDrop.6994
Dropper.Small AVG Trojan.MulDrop.7983
Dropper.Small AVG Trojan.MulDrop.2277
Dropper.Small AVG Trojan.MulDrop.12129
Dropper.Small AVG Trojan.DownLoader.30187
Dropper.Small AVG BackDoor.Pigeon.9581
Dropper.Small AVG Win32.HLLM.Graz.based
Dropper.Small AVG BackDoor.Pigeon.9285
Dropper.Small AVG Trojan.MulDrop.13665
Dropper.Small AVG Trojan.MulDrop.13075
Dropper.Small AVG Tool.DialupPass
Dropper.Small AVG Trojan.Microlog
Dropper.Small AVG Trojan.DownLoader.925
Dropper.Small AVG BackDoor.Nels
Dropper.Small AVG Trojan.IPager
Dropper.Small AVG Trojan.MulDrop.10318
Dropper.Small AVG Trojan.MulDrop.5502
Dropper.Small AVG Trojan.MulDrop.10274
Dropper.Small AVG BackDoor.Pigeon.12932
Dropper.Small AVG Trojan.DownLoader.36306
Dropper.Small AVG BackDoor.Pigeon.8335
Dropper.Small AVG Trojan.MulDrop.10823
Dropper.Small AVG BackDoor.Pigeon.8334
Dropper.Small AVG Trojan.DownLoad.639
Dropper.Small AVG BackDoor.Pigeon.8385
Dropper.Small AVG Trojan.MulDrop.13666
Dropper.Small AVG Trojan.MulDrop.10289
Dropper.Small AVG Trojan.MulDrop.10285
Dropper.Small AVG Trojan.DownLoader.10011
Dropper.Small AVG Trojan.MulDrop.6760
Dropper.Small AVG Trojan.MulDrop.6694
Dropper.Small AVG Trojan.MulDrop.7871
Dropper.Small AVG Trojan.MulDrop.7870
Dropper.Small AVG Trojan.MulDrop.9876
Dropper.Small AVG Trojan.MulDrop.6371
Dropper.Small AVG Win32.Virut.12
Dropper.Small AVG Trojan.MulDrop.6048
Dropper.Small AVG Trojan.MulDrop.6066

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies