Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Small aliases:

Name Vendor Dr.Web classification name
Win32/Small Microsoft Trojan.MulDrop.4585
Win32/Small Microsoft Trojan.MulDrop.5980
Win32/Small Microsoft Trojan.MulDrop.5822
Win32/Small Microsoft Trojan.Zombie.20730
Win32/Small Microsoft Trojan.DownLoader.7667
Win32/Small Microsoft Trojan.DownLoader.8129
Win32/Small Microsoft Trojan.DownLoader.7614
Win32/Small Microsoft Trojan.DownLoader.7689
Win32/Small Microsoft Trojan.DownLoader.7638
Win32/Small Microsoft Trojan.DownLoader.7127
Win32/Small Microsoft Trojan.DownLoader.7220
Win32/Small Microsoft Trojan.DownLoader.7466
Win32/Small Microsoft Trojan.DownLoader.7635
Win32/Small Microsoft Trojan.DownLoader.7575
Win32/Small Microsoft Trojan.DownLoader.55816
Win32/Small Microsoft Trojan.DownLoader.7630
Win32/Small Microsoft Trojan.DownLoader.7950
Win32/Small Microsoft Trojan.DownLoader.7578
Win32/Small Microsoft Trojan.DownLoader.7609
Win32/Small Microsoft Trojan.DownLoader.7655
Win32/Small Microsoft Trojan.DownLoader.7435
Win32/Small Microsoft Trojan.DownLoader.7249
Win32/Small Microsoft Trojan.DownLoader.7318
Win32/Small Microsoft Trojan.DownLoader.7686
Win32/Small Microsoft Trojan.DownLoader.7669
Win32/Small Microsoft Trojan.DownLoader.7637
Win32/Small Microsoft Trojan.DownLoader.7581
Win32/Small Microsoft Trojan.DownLoader.7222
Win32/Small Microsoft Trojan.DownLoader.7642
Win32/Small Microsoft Trojan.DownLoader.7612
Win32/Small Microsoft Trojan.DownLoader.7830
Win32/Small Microsoft Trojan.DownLoader.7326
Win32/Small Microsoft Trojan.DownLoader.7684
Win32/Small Microsoft Trojan.Proxy.645
Win32/Small Microsoft Trojan.DownLoader.7381
Win32/Small Microsoft Trojan.DownLoader.7533
Win32/Small Microsoft Trojan.DownLoader.7623
Win32/Small Microsoft Trojan.DownLoader.7639
Win32/Small Microsoft Trojan.DownLoader.7696
Win32/Small Microsoft Trojan.DownLoader.7968
Win32/Small Microsoft Trojan.DownLoader.7587
Win32/Small Microsoft Trojan.DownLoader.7915
Win32/Small Microsoft Trojan.DownLoader.7625
Win32/Small Microsoft Trojan.DownLoader.7690
Win32/Small Microsoft Trojan.DownLoader.7624
Win32/Small Microsoft Trojan.DownLoader.1651
Win32/Small Microsoft Trojan.Proxy.678
Win32/Small Microsoft Trojan.StartPage.1206
Win32/Small Microsoft Trojan.StartPage.1212
Win32/Small Microsoft VirusConstructor.Pterror

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.