FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Tearspear aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Tearspear Microsoft Trojan.PWS.Banker.27258
TrojanDownloader:Win32/Tearspear Microsoft Trojan.PWS.Banker.1942
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7513
TrojanDownloader:Win32/Tearspear Microsoft Trojan.PWS.Banker.27106
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7910
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7374
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.8130
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7430
TrojanDownloader:Win32/Tearspear Microsoft BackDoor.Proxsm.12
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7747
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7064
TrojanDownloader:Win32/Tearspear Microsoft Trojan.PWS.Banker.1784
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7104
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7611
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7704
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7580
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7568
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7705
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7919
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7934
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10949
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11464
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10941
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11493
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10792
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11471
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10810
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10985
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10899
TrojanDownloader:Win32/Tearspear Microsoft Program.KgbSpy
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11453
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10847
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11136
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11306
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11045
TrojanDownloader:Win32/Tearspear Microsoft Trojan.PWS.Banker.27683
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11534
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11378
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.57539
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoad.29457
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoad.30104
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoad.30673
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.37693
TrojanDownloader:Win32/Tearspear Microsoft Trojan.Click.4948
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.37917
TrojanDownloader:Win32/Tearspear Microsoft BackDoor.Generic.1445
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoad.25514
TrojanDownloader:Win32/Tearspear Microsoft Adware.Mokead
TrojanDownloader:Win32/Tearspear Microsoft BackDoor.Sabason
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.62849

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies