Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32 Shadow AutoStart Install aliases:

Name Vendor Dr.Web classification name
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.265
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Webview
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLP.Mila
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Copyself
Win32 Shadow AutoStart Install VirusBlokAda Adware.Cdn
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Klop
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.5444
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLP.Arelgen.1
Win32 Shadow AutoStart Install VirusBlokAda Trojan.MulDrop.30482
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLP.Arelgen.3
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Provider
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.NeoRat
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Spider.33796
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Spooner
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Thunkiss
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Wolf
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Freeone
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.IRC.Serd.16
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Pesin.4
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Antinny.11
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Servant
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.13578
Win32 Shadow AutoStart Install VirusBlokAda Exploit.ActiveX
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Lanman
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.39273
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.42937
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.42780
Win32 Shadow AutoStart Install VirusBlokAda Trojan.MulDrop.10379
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Banker.11056
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Click.17265
Win32 Shadow AutoStart Install VirusBlokAda Adware.Kwsearch
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.KGB
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoad.34688
Win32 Shadow AutoStart Install VirusBlokAda Adware.WebHancer
Win32 Shadow AutoStart Install VirusBlokAda Trojan.MulDrop.30871
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Gamania.8129
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.51285
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.51586
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.33721
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.32308
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.53076
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.47353
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Yogya
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.7449
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.32428
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Click.17732
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Click.17733
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Click.17600
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.50511
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.53176

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.