Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Tearspear aliases:

Name Vendor Dr.Web classification name
Win32/Tearspear Microsoft Trojan.DownLoader.56445
Win32/Tearspear Microsoft Trojan.DownLoader.7919
Win32/Tearspear Microsoft Trojan.DownLoader.7056
Win32/Tearspear Microsoft Trojan.DownLoader.7934
Win32/Tearspear Microsoft Trojan.DownLoader.7119
Win32/Tearspear Microsoft Trojan.DownLoader.8078
Win32/Tearspear Microsoft Trojan.DownLoader.7063
Win32/Tearspear Microsoft Trojan.DownLoader.46497
Win32/Tearspear Microsoft Trojan.DownLoader.8125
Win32/Tearspear Microsoft Trojan.DownLoader.7646
Win32/Tearspear Microsoft Trojan.DownLoader.7444
Win32/Tearspear Microsoft Trojan.DownLoader.7122
Win32/Tearspear Microsoft Trojan.DownLoader.7285
Win32/Tearspear Microsoft Trojan.DownLoader.7589
Win32/Tearspear Microsoft Trojan.DownLoader.7917
Win32/Tearspear Microsoft Trojan.DownLoader.42615
Win32/Tearspear Microsoft Trojan.DownLoader.7580
Win32/Tearspear Microsoft Trojan.PWS.Banker.12565
Win32/Tearspear Microsoft Trojan.DownLoader.7958
Win32/Tearspear Microsoft Trojan.DownLoader.7098
Win32/Tearspear Microsoft Trojan.DownLoader.7645
Win32/Tearspear Microsoft Trojan.DownLoader.3233
Win32/Tearspear Microsoft Trojan.DownLoader.7295
Win32/Tearspear Microsoft Trojan.DownLoader.7936
Win32/Tearspear Microsoft Trojan.DownLoader.7914
Win32/Tearspear Microsoft Trojan.DownLoader.7704
Win32/Tearspear Microsoft Trojan.DownLoader.7445
Win32/Tearspear Microsoft Trojan.DownLoader.7290
Win32/Tearspear Microsoft Trojan.DownLoader.7949
Win32/Tearspear Microsoft Trojan.DownLoader.7053
Win32/Tearspear Microsoft Trojan.DownLoader.7074
Win32/Tearspear Microsoft Trojan.DownLoader.7106
Win32/Tearspear Microsoft Trojan.DownLoader.7688
Win32/Tearspear Microsoft Trojan.DownLoader.7568
Win32/Tearspear Microsoft Trojan.DownLoader.7596
Win32/Tearspear Microsoft Trojan.DownLoader.7641
Win32/Tearspear Microsoft Trojan.DownLoader.7660
Win32/Tearspear Microsoft Trojan.DownLoader.46506
Win32/Tearspear Microsoft Trojan.DownLoader.49353
Win32/Tearspear Microsoft Trojan.DownLoader.7072
Win32/Tearspear Microsoft Trojan.DownLoader.7693
Win32/Tearspear Microsoft Trojan.DownLoader.7959
Win32/Tearspear Microsoft Trojan.DownLoader.7611
Win32/Tearspear Microsoft Trojan.DownLoader.46606
Win32/Tearspear Microsoft Trojan.DownLoader.18686
Win32/Tearspear Microsoft Trojan.DownLoader.5921
Win32/Tearspear Microsoft Trojan.DownLoader.5553
Win32/Tearspear Microsoft Trojan.DownLoader.50606
Win32/Tearspear Microsoft Trojan.DownLoader.1216
Win32/Tearspear Microsoft Trojan.DownLoader.1108

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.