Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Meredrop aliases:

Name Vendor Dr.Web classification name
Win32/Meredrop Microsoft Win32.HLLM.Limar.2247
Win32/Meredrop Microsoft Win32.HLLM.Limar.2254
Win32/Meredrop Microsoft Trojan.MulDrop.6203
Win32/Meredrop Microsoft Trojan.MulDrop.10783
Win32/Meredrop Microsoft Trojan.MulDrop.4989
Win32/Meredrop Microsoft Trojan.Hooker.256
Win32/Meredrop Microsoft Trojan.MulDrop.10239
Win32/Meredrop Microsoft Trojan.MulDrop.12166
Win32/Meredrop Microsoft Trojan.MulDrop.11541
Win32/Meredrop Microsoft Trojan.MulDrop.11184
Win32/Meredrop Microsoft Trojan.MulDrop.12181
Win32/Meredrop Microsoft Trojan.MulDrop.5475
Win32/Meredrop Microsoft Trojan.MulDrop.5414
Win32/Meredrop Microsoft Trojan.MulDrop.5019
Win32/Meredrop Microsoft Trojan.MulDrop.10113
Win32/Meredrop Microsoft Trojan.DownLoader.7456
Win32/Meredrop Microsoft Trojan.DownLoader.7216
Win32/Meredrop Microsoft Trojan.DownLoader.8049
Win32/Meredrop Microsoft Trojan.PWS.Vipgsm
Win32/Meredrop Microsoft Trojan.StartPage.1207
Win32/Meredrop Microsoft Trojan.DownLoader.54878
Win32/Meredrop Microsoft Trojan.DownLoader.31368
Win32/Meredrop Microsoft Trojan.MulDrop.2175
Win32/Meredrop Microsoft Trojan.MulDrop.2224
Win32/Meredrop Microsoft Trojan.MulDrop.2277
Win32/Meredrop Microsoft Trojan.MulDrop.2445
Win32/Meredrop Microsoft Trojan.PWS.Banker.10029
Win32/Meredrop Microsoft Trojan.PWS.Banker.10332
Win32/Meredrop Microsoft Trojan.Proxy.1868
Win32/Meredrop Microsoft Trojan.PWS.Banker.10063
Win32/Meredrop Microsoft BackDoor.Bifrost.10
Win32/Meredrop Microsoft Trojan.DownLoader.1113
Win32/Meredrop Microsoft Trojan.DownLoader.32402
Win32/Meredrop Microsoft BackDoor.IRC.Sdbot.2679
Win32/Meredrop Microsoft Trojan.MulDrop.148
Win32/Meredrop Microsoft Trojan.Lenovo
Win32/Meredrop Microsoft Trojan.Inject.251
Win32/Meredrop Microsoft Trojan.MulDrop.3433
Win32/Meredrop Microsoft Trojan.MulDrop.3489
Win32/Meredrop Microsoft Trojan.MulDrop.3440
Win32/Meredrop Microsoft Trojan.Inject.57
Win32/Meredrop Microsoft Trojan.Iespy
Win32/Meredrop Microsoft Trojan.MulDrop.3342
Win32/Meredrop Microsoft Trojan.MulDrop.3358
Win32/Meredrop Microsoft Trojan.MulDrop.3510
Win32/Meredrop Microsoft Trojan.MulDrop.3441
Win32/Meredrop Microsoft Trojan.MulDrop.3429
Win32/Meredrop Microsoft Trojan.Elispy
Win32/Meredrop Microsoft Trojan.MulDrop.3437
Win32/Meredrop Microsoft Trojan.DownLoader.16353

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.