Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_BREDLAB.SMD aliases:

Name Vendor Dr.Web classification name
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.38587
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.13370
TROJ_BREDLAB.SMD Trend Micro Trojan.AVKill.2070
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.15371
TROJ_BREDLAB.SMD Trend Micro Trojan.PWS.Multi.76
TROJ_BREDLAB.SMD Trend Micro Trojan.Siggen2.7036
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.26170
TROJ_BREDLAB.SMD Trend Micro BackDoor.Poison.474
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.8402
TROJ_BREDLAB.SMD Trend Micro BackDoor.IRC.Unkbot.474
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.39451
TROJ_BREDLAB.SMD Trend Micro Trojan.PWS.Dybalom
TROJ_BREDLAB.SMD Trend Micro BackDoor.Shellbot.100
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.2
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.30703
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.11115
TROJ_BREDLAB.SMD Trend Micro Trojan.MulDrop1.54045
TROJ_BREDLAB.SMD Trend Micro Trojan.MulDrop1.48278
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.9156
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.14576
TROJ_BREDLAB.SMD Trend Micro BackDoor.Bifrost.15001
TROJ_BREDLAB.SMD Trend Micro Trojan.MulDrop1.51368
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.38706
TROJ_BREDLAB.SMD Trend Micro Trojan.Siggen1.61439
TROJ_BREDLAB.SMD Trend Micro BackDoor.Bifrost.14418
TROJ_BREDLAB.SMD Trend Micro Trojan.Siggen2.9940
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.13360
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader.30260
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.11318
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.40349
TROJ_BREDLAB.SMD Trend Micro Win32.HLLW.Autoruner.34866
TROJ_BREDLAB.SMD Trend Micro Trojan.Siggen2.7127
TROJ_BREDLAB.SMD Trend Micro BackDoor.Bifrost.14004
TROJ_BREDLAB.SMD Trend Micro Trojan.PWS.Multi.56
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.11687
TROJ_BREDLAB.SMD Trend Micro Trojan.Siggen2.5346
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.28953
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.32475
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.29713
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.14408
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.30572
TROJ_BREDLAB.SMD Trend Micro Trojan.MulDrop.20078
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.13741
TROJ_BREDLAB.SMD Trend Micro Trojan.Siggen2.6738
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.40662
TROJ_BREDLAB.SMD Trend Micro Trojan.Inject.15066
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.26631
TROJ_BREDLAB.SMD Trend Micro Win32.HLLW.Autoruner.22584
TROJ_BREDLAB.SMD Trend Micro Trojan.Packed.20162
TROJ_BREDLAB.SMD Trend Micro Trojan.DownLoader1.40054

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.