Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDropper:Win32/Dowque.A aliases:

Name Vendor Dr.Web classification name
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.9846
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Qqpass.1634
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.9114
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.9835
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.9856
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Qqpass.1631
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Lineage.3807
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.1077
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.9882
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.9811
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.9017
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.9881
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.1074
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.9707
TrojanDropper:Win32/Dowque.A Microsoft Win32.HLLW.Autoruner.893
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.13148
TrojanDropper:Win32/Dowque.A Microsoft Trojan.Packed.158
TrojanDropper:Win32/Dowque.A Microsoft Trojan.DownLoader.7059
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.8997
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.844
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.3118
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.2391
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.408
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.576
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.2951
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Gamania.12981
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.1283
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.13451
TrojanDropper:Win32/Dowque.A Microsoft Trojan.Shua.142
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Gamania
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Gamania.11514
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.1108
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.17243
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.8206
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.8176
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.6643
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.798
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Pigeon.2253
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.2138
TrojanDropper:Win32/Dowque.A Microsoft Trojan.MulDrop.17032
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.1148
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.1522
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Rejoice.138
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.414
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Gamania.2959
TrojanDropper:Win32/Dowque.A Microsoft Trojan.PWS.Gamania.2961
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.906
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.953
TrojanDropper:Win32/Dowque.A Microsoft BackDoor.Huai.896

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.