Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Small aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Small Microsoft Trojan.Inject.616
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.33649
TrojanDownloader:Win32/Small Microsoft Trojan.Daudi
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.18683
TrojanDownloader:Win32/Small Microsoft Win32.HLLW.Flask
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.10895
TrojanDownloader:Win32/Small Microsoft Trojan.Click.1952
TrojanDownloader:Win32/Small Microsoft Trojan.PWS.Gamania.7274
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.10071
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.883
TrojanDownloader:Win32/Small Microsoft Trojan.Ardex
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.33476
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.16161
TrojanDownloader:Win32/Small Microsoft BackDoor.ProRat.200
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.38117
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader1.956
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.18260
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.8855
TrojanDownloader:Win32/Small Microsoft Trojan.PWS.Hangame
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.39017
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.37142
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.3550
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.5663
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.19177
TrojanDownloader:Win32/Small Microsoft Trojan.PWS.GoldSpy
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.42833
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.37600
TrojanDownloader:Win32/Small Microsoft Trojan.PWS.Grabber.27
TrojanDownloader:Win32/Small Microsoft BackDoor.Shi
TrojanDownloader:Win32/Small Microsoft Trojan.Proxy.664
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.4716
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.6958
TrojanDownloader:Win32/Small Microsoft Trojan.Siggen.61008
TrojanDownloader:Win32/Small Microsoft BackDoor.Hostem
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.9422
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.9170
TrojanDownloader:Win32/Small Microsoft Trojan.Click.17451
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.18406
TrojanDownloader:Win32/Small Microsoft BackDoor.Haxdoor
TrojanDownloader:Win32/Small Microsoft Trojan.MulDrop.10902
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.3221
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.36955
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.802
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.898
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.47472
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.36695
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.21335
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.17595
TrojanDownloader:Win32/Small Microsoft Trojan.Puma
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.3879

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.