Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Packed.20878 aliases:

Name Vendor Dr.Web classification name
TR/Dldr.FakeAV.AO.5 Avira Trojan.Packed.20878
Bredolab.gen.c McAfee Trojan.Packed.20878
Trojan-Downloader.Win32.Agent.eesv Kaspersky Trojan.Packed.20878
TrojanDownloader:Win32/Waledac.C Microsoft Trojan.Packed.20878
BScope.Trojan.MTA.0798 VirusBlokAda Trojan.Packed.20878
Trojan.Generic.4625450 BitDefender Trojan.Packed.20878
Trojan-Downloader.Win32.Reipym.b (v) SunBelt Trojan.Packed.20878
TROJ_FAKEAV.FGZ Trend Micro Trojan.Packed.20878
Bredolab.gen.z McAfee Trojan.Packed.20878
TR/FakeAV.BD.43 Avira Trojan.Packed.20878
TrojanSpy:Win32/Fitmu.A Microsoft Trojan.Packed.20878
Trojan-Downloader.Win32.Agent.efpe Kaspersky Trojan.Packed.20878
Trojan.Agent.AQJB BitDefender Trojan.Packed.20878
TSPY_FITMU.E Trend Micro Trojan.Packed.20878
BDS/Bredolab.D.1 Avira Trojan.Packed.20878
Trojan-Downloader.Win32.Agent.egdr Kaspersky Trojan.Packed.20878
Trojan.Generic.KD.26403 BitDefender Trojan.Packed.20878
TROJ_FAKEAV.SMJR Trend Micro Trojan.Packed.20878
TR/Kazy.3361.13 Avira Trojan.Packed.20878
Trojan-Downloader.Win32.FraudLoad.xzrm Kaspersky Trojan.Packed.20878
Malware-Cryptor.Ander VirusBlokAda Trojan.Packed.20878
Gen:Variant.Kazy.3361 BitDefender Trojan.Packed.20878
Trojan-Downloader.Win32.FraudLoad.hcy (v) SunBelt Trojan.Packed.20878
TROJ_BREDO.SMP Trend Micro Trojan.Packed.20878
Downloader-CEW.g McAfee Trojan.Packed.20878
TR/Kryptik.FY Avira Trojan.Packed.20878
Trojan-Dropper.Win32.HDrop.agn Kaspersky Trojan.Packed.20878
Gen:Variant.Bredo.21 BitDefender Trojan.Packed.20878
TROJ_BREDO.SMK Trend Micro Trojan.Packed.20878
TR/Kryptik.hma Avira Trojan.Packed.20878
Generic PWS.tj McAfee Trojan.Packed.20878
Trojan-Downloader.Win32.FraudLoad.hcy Kaspersky Trojan.Packed.20878
Trojan.Looker.xg VirusBlokAda Trojan.Packed.20878
Gen:Variant.Kazy.1871 BitDefender Trojan.Packed.20878
TROJ_BREDO.SMAI Trend Micro Trojan.Packed.20878
TR/Kazy.3361.30 Avira Trojan.Packed.20878
Generic Downloader.x!edu McAfee Trojan.Packed.20878
Trojan-Downloader.Win32.FraudLoad.yacu Kaspersky Trojan.Packed.20878
TR/Dldr.FakeAV.BO Avira Trojan.Packed.20878
Trojan-Dropper.Win32.HDrop.ajv Kaspersky Trojan.Packed.20878
Generic.dx!uvp McAfee Trojan.Packed.20878
TR/Spy.Agent.adq Avira Trojan.Packed.20878
HEUR:Trojan.Win32.Generic Kaspersky Trojan.Packed.20878
Gen:Variant.Kazy.3715 BitDefender Trojan.Packed.20878
TR/Kazy.AA Avira Trojan.Packed.20878
PWS:Win32/Zbot.gen!Y Microsoft Trojan.Packed.20878
Trojan-Dropper.Win32.HDrop.acg Kaspersky Trojan.Packed.20878
Gen:Variant.Kazy.1219 BitDefender Trojan.Packed.20878
PWS-Zbot.gen.cl McAfee Trojan.Packed.20878
TR/Crypt.ZPACK.Gen2 Avira Trojan.Packed.20878

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.