Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_DLDER aliases:

Name Vendor Dr.Web classification name
Possible_DLDER Trend Micro Trojan.DownLoader.9158
Possible_DLDER Trend Micro Trojan.DownLoader.9115
Possible_DLDER Trend Micro Trojan.DownLoader.9171
Possible_DLDER Trend Micro Trojan.DownLoader.7258
Possible_DLDER Trend Micro Trojan.DownLoader.7127
Possible_DLDER Trend Micro Trojan.DownLoader.7566
Possible_DLDER Trend Micro Trojan.DownLoader.7220
Possible_DLDER Trend Micro Trojan.DownLoader.7253
Possible_DLDER Trend Micro Trojan.DownLoader.7578
Possible_DLDER Trend Micro Trojan.DownLoader.8121
Possible_DLDER Trend Micro Trojan.DownLoader.7659
Possible_DLDER Trend Micro Trojan.DownLoader.8011
Possible_DLDER Trend Micro Trojan.DownLoader.7177
Possible_DLDER Trend Micro Trojan.DownLoader.7637
Possible_DLDER Trend Micro Trojan.DownLoader.7678
Possible_DLDER Trend Micro Trojan.DownLoader.7567
Possible_DLDER Trend Micro Trojan.DownLoader.7315
Possible_DLDER Trend Micro Trojan.DownLoader.7421
Possible_DLDER Trend Micro Trojan.Swizzor
Possible_DLDER Trend Micro Trojan.DownLoader.56947
Possible_DLDER Trend Micro Trojan.DownLoader.669
Possible_DLDER Trend Micro Trojan.DownLoader.725
Possible_DLDER Trend Micro Trojan.DownLoader.1281
Possible_DLDER Trend Micro BackDoor.Bandook
Possible_DLDER Trend Micro BackDoor.Groan
Possible_DLDER Trend Micro Trojan.Proxy.1932
Possible_DLDER Trend Micro Win32.HLLW.JnxBot
Possible_DLDER Trend Micro Trojan.DownLoader.1325
Possible_DLDER Trend Micro BackDoor.IRC.Transistor
Possible_DLDER Trend Micro Trojan.DownLoader.1232
Possible_DLDER Trend Micro Trojan.DownLoader.1311
Possible_DLDER Trend Micro Trojan.DownLoader.1108
Possible_DLDER Trend Micro Trojan.DownLoader.1247
Possible_DLDER Trend Micro Trojan.DownLoader.55170
Possible_DLDER Trend Micro Trojan.DownLoader.20866
Possible_DLDER Trend Micro Trojan.DownLoader.2388
Possible_DLDER Trend Micro Trojan.DownLoader.13381
Possible_DLDER Trend Micro BackDoor.IRC.Sdbot.1897
Possible_DLDER Trend Micro Trojan.DownLoader.3692
Possible_DLDER Trend Micro Trojan.DownLoader.55328
Possible_DLDER Trend Micro Trojan.DownLoader.3496
Possible_DLDER Trend Micro BackDoor.Aphex
Possible_DLDER Trend Micro Trojan.Isbar.417
Possible_DLDER Trend Micro Trojan.DownLoader.4995
Possible_DLDER Trend Micro Trojan.Hobot
Possible_DLDER Trend Micro Trojan.MulDrop.3443
Possible_DLDER Trend Micro Trojan.Isbar.419
Possible_DLDER Trend Micro Trojan.DownLoader.6574
Possible_DLDER Trend Micro Trojan.DownLoader.52953
Possible_DLDER Trend Micro Trojan.DownLoader.52812

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.