Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Spammer:Win32/Tedroo.I aliases:

Name Vendor Dr.Web classification name
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.3379
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.3531
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.3202
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.3377
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.3433
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4282
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.3584
Spammer:Win32/Tedroo.I Microsoft BackDoor.Tdss.91
Spammer:Win32/Tedroo.I Microsoft BackDoor.Tdss.92
Spammer:Win32/Tedroo.I Microsoft BackDoor.Tdss.104
Spammer:Win32/Tedroo.I Microsoft BackDoor.Tdss.93
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4424
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4429
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4434
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.3588
Spammer:Win32/Tedroo.I Microsoft Trojan.Packed.19647
Spammer:Win32/Tedroo.I Microsoft BackDoor.Siggen.203
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4465
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4464
Spammer:Win32/Tedroo.I Microsoft Trojan.Packed.687
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4538
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4539
Spammer:Win32/Tedroo.I Microsoft Trojan.Packed.573
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4555
Spammer:Win32/Tedroo.I Microsoft Trojan.Siggen.3029
Spammer:Win32/Tedroo.I Microsoft Trojan.Packed.682
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4490
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4760
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4431
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4485
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4461
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4590
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4564
Spammer:Win32/Tedroo.I Microsoft Trojan.DownLoad.42336
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4776
Spammer:Win32/Tedroo.I Microsoft Trojan.Packed.2562
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4547
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4697
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4679
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4682
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4681
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4673
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4695
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4701
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4672
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4674
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4710
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4691
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4699
Spammer:Win32/Tedroo.I Microsoft Trojan.Spambot.4704

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.