Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Small aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Small Microsoft Trojan.NtRootKit.101
Trojan:Win32/Small Microsoft Trojan.MulDrop.3315
Trojan:Win32/Small Microsoft Trojan.MulDrop.3975
Trojan:Win32/Small Microsoft Trojan.Rond
Trojan:Win32/Small Microsoft Trojan.Xifraud
Trojan:Win32/Small Microsoft Win32.HLLW.Loader.16
Trojan:Win32/Small Microsoft Flooder.Boxed
Trojan:Win32/Small Microsoft Trojan.MulDrop.6924
Trojan:Win32/Small Microsoft Trojan.DownLoader.62796
Trojan:Win32/Small Microsoft Trojan.WpePro
Trojan:Win32/Small Microsoft Trojan.DownLoader.18843
Trojan:Win32/Small Microsoft Trojan.DownLoader.23051
Trojan:Win32/Small Microsoft Trojan.Click.1959
Trojan:Win32/Small Microsoft Trojan.DownLoader.35886
Trojan:Win32/Small Microsoft Adware.Baidu.270
Trojan:Win32/Small Microsoft BackDoor.Parla
Trojan:Win32/Small Microsoft BackDoor.IRC.Gym
Trojan:Win32/Small Microsoft Win32.HLLM.Tan
Trojan:Win32/Small Microsoft Trojan.Packed.162
Trojan:Win32/Small Microsoft Trojan.Havedo
Trojan:Win32/Small Microsoft Trojan.LowZones.209
Trojan:Win32/Small Microsoft Trojan.DownLoader.27858
Trojan:Win32/Small Microsoft Trojan.DownLoader.27857
Trojan:Win32/Small Microsoft Trojan.PWS.LDPinch.1236
Trojan:Win32/Small Microsoft BackDoor.IRC.Sdbot.901
Trojan:Win32/Small Microsoft Trojan.Popwin
Trojan:Win32/Small Microsoft Trojan.DownLoader.36034
Trojan:Win32/Small Microsoft Trojan.Das.2
Trojan:Win32/Small Microsoft Trojan.NtRootKit.160
Trojan:Win32/Small Microsoft Trojan.DownLoader.18319
Trojan:Win32/Small Microsoft Trojan.Siggen.186
Trojan:Win32/Small Microsoft Trojan.DownLoader.4886
Trojan:Win32/Small Microsoft BackDoor.Rbot.12
Trojan:Win32/Small Microsoft Trojan.MulDrop.6464
Trojan:Win32/Small Microsoft Tool.Netss
Trojan:Win32/Small Microsoft Trojan.DownLoader.18910
Trojan:Win32/Small Microsoft Trojan.Siggen.174
Trojan:Win32/Small Microsoft Trojan.Siggen.187
Trojan:Win32/Small Microsoft Trojan.DownLoader.61904
Trojan:Win32/Small Microsoft Trojan.DownLoader.35000
Trojan:Win32/Small Microsoft Trojan.DownLoader.28918
Trojan:Win32/Small Microsoft Trojan.NewsFlood
Trojan:Win32/Small Microsoft Trojan.PWS.Vipgsm
Trojan:Win32/Small Microsoft Trojan.MulDrop.11924
Trojan:Win32/Small Microsoft Trojan.DownLoader.22389
Trojan:Win32/Small Microsoft Trojan.Click.1700
Trojan:Win32/Small Microsoft Trojan.Archi
Trojan:Win32/Small Microsoft Trojan.DownLoader.32507
Trojan:Win32/Small Microsoft Trojan.DownLoader.30548
Trojan:Win32/Small Microsoft Trojan.Spambot.2946

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.