Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDropper:Win32/Emold.C aliases:

Name Vendor Dr.Web classification name
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.5266
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.5155
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.4465
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.5080
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.2536
TrojanDropper:Win32/Emold.C Microsoft Trojan.Packed.366
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6815
TrojanDropper:Win32/Emold.C Microsoft Dialer.Inst
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6132
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.5207
TrojanDropper:Win32/Emold.C Microsoft Trojan.NtRootKit.1722
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6283
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6317
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6171
TrojanDropper:Win32/Emold.C Microsoft Trojan.Packed.393
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6311
TrojanDropper:Win32/Emold.C Microsoft Trojan.Packed.149
TrojanDropper:Win32/Emold.C Microsoft Trojan.Packed.334
TrojanDropper:Win32/Emold.C Microsoft Trojan.Inject.5361
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.4625
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.5203
TrojanDropper:Win32/Emold.C Microsoft Trojan.MulDrop.29219
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6378
TrojanDropper:Win32/Emold.C Microsoft Trojan.EmailSpy.188
TrojanDropper:Win32/Emold.C Microsoft Trojan.MulDrop.29362
TrojanDropper:Win32/Emold.C Microsoft Trojan.MulDrop.16697
TrojanDropper:Win32/Emold.C Microsoft Trojan.NtRootKit.2387
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6400
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.4317
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6163
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6486
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6413
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6452
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6457
TrojanDropper:Win32/Emold.C Microsoft Trojan.Packed.452
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6109
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6547
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6607
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6326
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6616
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6635
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6655
TrojanDropper:Win32/Emold.C Microsoft Trojan.Inject.3699
TrojanDropper:Win32/Emold.C Microsoft Trojan.MulDrop.18269
TrojanDropper:Win32/Emold.C Microsoft Trojan.DownLoad.3735
TrojanDropper:Win32/Emold.C Microsoft Trojan.DownLoad.37225
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6681
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6710
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6717
TrojanDropper:Win32/Emold.C Microsoft Win32.HLLW.Autoruner.6235

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.