Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Virus.Dropper aliases:

Name Vendor Dr.Web classification name
Virus.Dropper Symantec Zombie.PGPMorph
Virus.Dropper Symantec Nadym.491
Virus.Dropper Symantec Xuxa.1088
Virus.Dropper Symantec Wyx.dropper
Virus.Dropper Symantec Sampo.dropper
Virus.Dropper Symantec Win.Vir1.4
Virus.Dropper Symantec Win.Vfw.988
Virus.Dropper Symantec Win95.Inca
Virus.Dropper Symantec Win.HLLM.Yoyk.15104
Virus.Dropper Symantec HLLW.Petik.36812
Virus.Dropper Symantec Trojan.MulDrop.119
Virus.Dropper Symantec Trojan.MulDrop.80
Virus.Dropper Symantec Trojan.Concor.21
Virus.Dropper Symantec Trojan.MulDrop.44
Virus.Dropper Symantec Trojan.MulDrop.13
Virus.Dropper Symantec Trojan.MulDrop.39
Virus.Dropper Symantec Trojan.AVKill.4608
Virus.Dropper Symantec Trojan.MulDrop.114
Virus.Dropper Symantec Trojan.MulDrop.113
Virus.Dropper Symantec Trojan.MulDrop.188
Virus.Dropper Symantec Trojan.MulDrop.111
Virus.Dropper Symantec Trojan.MulDrop.187
Virus.Dropper Symantec Trojan.MulDrop.185
Virus.Dropper Symantec Trojan.MulDrop.97
Virus.Dropper Symantec Trojan.MulDrop.312
Virus.Dropper Symantec BackDoor.Oblivion.1
Virus.Dropper Symantec Trojan.MulDrop.136
Virus.Dropper Symantec Trojan.TMan
Virus.Dropper Symantec Trojan.MulDrop.153
Virus.Dropper Symantec Trojan.Sena
Virus.Dropper Symantec Trojan.PWS.Mumed
Virus.Dropper Symantec Trojan.MulDrop.2304
Virus.Dropper Symantec Trojan.MulDrop.310
Virus.Dropper Symantec Trojan.PWS.Leshiy
Virus.Dropper Symantec Trojan.MulDrop.1307
Virus.Dropper Symantec Trojan.MulDrop.547
Virus.Dropper Symantec Trojan.MulDrop.205
Virus.Dropper Symantec Trojan.MulDrop.125
Virus.Dropper Symantec Trojan.Maze
Virus.Dropper Symantec BackDoor.SubSeven.21
Virus.Dropper Symantec Trojan.DownLoader.575
Virus.Dropper Symantec Trojan.DownLoader.20480
Virus.Dropper Symantec Trojan.Phrostic.102
Virus.Dropper Symantec Trojan.MulDrop.31
Virus.Dropper Symantec Trojan.Ill.30
Virus.Dropper Symantec BackDoor.GWBoy.91
Virus.Dropper Symantec Trojan.MulDrop.6
Virus.Dropper Symantec MBinder.Generator
Virus.Dropper Symantec MBinder.Generator.12
Virus.Dropper Symantec Trojan.MulDrop.10

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.