Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Small aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Small Microsoft Trojan.Mulply
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.6474
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.49796
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.11047
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.9651
TrojanDownloader:Win32/Small Microsoft Trojan.Click.origin
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.16476
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.14687
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.5980
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.7762
TrojanDownloader:Win32/Small Microsoft Win32.HLLM.Graz
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.14300
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.44045
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.40002
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.9045
TrojanDownloader:Win32/Small Microsoft Trojan.PWS.LDPinch.7704
TrojanDownloader:Win32/Small Microsoft Trojan.PWS.Banker.42242
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.40965
TrojanDownloader:Win32/Small Microsoft BackDoor.Sched
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoader.1911
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.51820
TrojanDownloader:Win32/Small Microsoft Trojan.MulDrop.54303
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.52376
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.52395
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.51919
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad1.23784
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.57373
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.51929
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.52396
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.52939
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.57740
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.53567
TrojanDownloader:Win32/Small Microsoft Trojan.DownLoad.53617

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.