Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Tearspear aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16838
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7595
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11763
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16233
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11255
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.12255
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16034
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.13010
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.12095
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16101
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16161
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.15986
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.12010
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.6441
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16197
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16204
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.14180
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7796
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11941
TrojanDownloader:Win32/Tearspear Microsoft Trojan.PWS.Banker.5829
TrojanDownloader:Win32/Tearspear Microsoft Adware.QuickLinks
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11870
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16269
TrojanDownloader:Win32/Tearspear Microsoft Trojan.MulDrop.1175
TrojanDownloader:Win32/Tearspear Microsoft Trojan.KeyLogger.487
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11180
TrojanDownloader:Win32/Tearspear Microsoft Trojan.StartPage.1546
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16186
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.9695
TrojanDownloader:Win32/Tearspear Microsoft Trojan.MulDrop.3887
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16811
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.16777
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.15726
TrojanDownloader:Win32/Tearspear Microsoft Trojan.Update
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.15032
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11411
TrojanDownloader:Win32/Tearspear Microsoft Trojan.MulDrop.4125
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.14230
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.15927
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.13569
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.10092
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.1423
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11327
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.11393
TrojanDownloader:Win32/Tearspear Microsoft Trojan.AVKill.595
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.46994
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.15026
TrojanDownloader:Win32/Tearspear Microsoft Trojan.MulDrop.4057
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.13541
TrojanDownloader:Win32/Tearspear Microsoft Trojan.DownLoader.7821

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.