Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32 Shadow AutoStart Install aliases:

Name Vendor Dr.Web classification name
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Mob.208
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.8708
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Siggen.1879
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Vbspreader.17
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLO.Black.6
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.22510
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoad.22771
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoad.5082
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoad.9363
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Bmcat
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.9105
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Xarom
Win32 Shadow AutoStart Install VirusBlokAda Tool.Ggtkill
Win32 Shadow AutoStart Install VirusBlokAda Adware.Raze
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Peaflo
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.10241
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.10455
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.4801
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.4593
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Revid
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.1071
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Mithril
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Admod
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Bizten.18963
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.11252
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.1073
Win32 Shadow AutoStart Install VirusBlokAda Adware.Cydoor
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.5063
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.14342
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.13553
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.13014
Win32 Shadow AutoStart Install VirusBlokAda Trojan.BeagleProxy
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Jeem
Win32 Shadow AutoStart Install VirusBlokAda Adware.SiteHistory
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.5610
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Autoruner.3731
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.3333
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Veryfun
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.5358
Win32 Shadow AutoStart Install VirusBlokAda Dialer.Private
Win32 Shadow AutoStart Install VirusBlokAda Adware.MediaCharger
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.54734
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Bruter
Win32 Shadow AutoStart Install VirusBlokAda Adware.OrangeTing
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage.722
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage.488
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.256
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Click.288
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.483
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Pmk

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.