Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32 Shadow AutoStart Install aliases:

Name Vendor Dr.Web classification name
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Dewin
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Doomka
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLM.MyDoom.35336
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.Dewin
Win32 Shadow AutoStart Install VirusBlokAda Trojan.PWS.DafDaf.2
Win32 Shadow AutoStart Install VirusBlokAda Trojan.KeyLogger.440
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.30085
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.29903
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLP.Zomby.17920
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage.433
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLP.Iparmor.35858
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Hitpop
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Holl
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.SpyBot.13
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Websearch
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.49629
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Chuma
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Notii
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage
Win32 Shadow AutoStart Install VirusBlokAda Dialer.Inst.16
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Nodad
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.42858
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.25626
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Winpop
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage.20309
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage.551
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.37063
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.36982
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.37149
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.37095
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.37109
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.37188
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.37183
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage.20671
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Starter.356
Win32 Shadow AutoStart Install VirusBlokAda Trojan.KeySpy.63
Win32 Shadow AutoStart Install VirusBlokAda Adware.FlashTrack
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Tofger.6074
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Sabason
Win32 Shadow AutoStart Install VirusBlokAda Win32.HLLW.Dibuka
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoad.586
Win32 Shadow AutoStart Install VirusBlokAda Trojan.StartPage.20781
Win32 Shadow AutoStart Install VirusBlokAda Trojan.DownLoader.9902
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Mitglied
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.2506
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.2648
Win32 Shadow AutoStart Install VirusBlokAda BackDoor.Rejoice.96
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Ketch
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.2004
Win32 Shadow AutoStart Install VirusBlokAda Trojan.Proxy.2783

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.