Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Krepper aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Krepper Microsoft Trojan.StartPage.1270
TrojanDownloader:Win32/Krepper Microsoft Trojan.Spambot
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.189
TrojanDownloader:Win32/Krepper Microsoft Trojan.PWS.Krepper
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.3862
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.19041
TrojanDownloader:Win32/Krepper Microsoft Win32.HLLW.Krepper
TrojanDownloader:Win32/Krepper Microsoft Trojan.Click.2276
TrojanDownloader:Win32/Krepper Microsoft Trojan.Click.2268
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20753
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20745
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20756
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20746
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20752
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20834
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20755
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20751
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20757
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20758
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20747
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20748
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.33171
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.47362
TrojanDownloader:Win32/Krepper Microsoft Trojan.Proxy.829
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.31705
TrojanDownloader:Win32/Krepper Microsoft Trojan.StartPage.47
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.5656
TrojanDownloader:Win32/Krepper Microsoft Trojan.Killer
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.5861
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.30592
TrojanDownloader:Win32/Krepper Microsoft Adware.Ihbo
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.23054
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20723
TrojanDownloader:Win32/Krepper Microsoft Trojan.Click.2342
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.22125
TrojanDownloader:Win32/Krepper Microsoft Trojan.Click.2075
TrojanDownloader:Win32/Krepper Microsoft Trojan.Click.2233
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20830
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.46127
TrojanDownloader:Win32/Krepper Microsoft BackDoor.Kot
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.45925
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.6626
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20750
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.44504
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.31560
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.36795
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.33170
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20721
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.20754
TrojanDownloader:Win32/Krepper Microsoft Trojan.DownLoader.14376

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.