Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hostil.F aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hostil.F Microsoft BackDoor.Pigeon.19150
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.6837
Backdoor:Win32/Hostil.F Microsoft Trojan.Packed.253
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoad.31312
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.10212
Backdoor:Win32/Hostil.F Microsoft Trojan.Proxy.1986
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoad.38631
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.18259
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.17213
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.28471
Backdoor:Win32/Hostil.F Microsoft Win32.HLLW.Autoruner.258
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.18598
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.18885
Backdoor:Win32/Hostil.F Microsoft Win32.HLLM.Reset
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.20866
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.22538
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.17186
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.17185
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.17576
Backdoor:Win32/Hostil.F Microsoft BackDoor.Pixbot
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.17448
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.7110
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.34062
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.36325
Backdoor:Win32/Hostil.F Microsoft Trojan.Spambot.4513
Backdoor:Win32/Hostil.F Microsoft Win32.HLLW.Autoruner.683
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.9997
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.9444
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.62893
Backdoor:Win32/Hostil.F Microsoft Trojan.Proxy.2853
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.6944
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.31800
Backdoor:Win32/Hostil.F Microsoft Trojan.Spambot
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.9148
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.9146
Backdoor:Win32/Hostil.F Microsoft Trojan.MulDrop.29183
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.9149
Backdoor:Win32/Hostil.F Microsoft Trojan.Proxy.1619
Backdoor:Win32/Hostil.F Microsoft Trojan.Proxy.1424
Backdoor:Win32/Hostil.F Microsoft Trojan.Proxy.1484
Backdoor:Win32/Hostil.F Microsoft Trojan.Proxy.1681
Backdoor:Win32/Hostil.F Microsoft Trojan.Packed.198
Backdoor:Win32/Hostil.F Microsoft Trojan.Proxy.952
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.15137
Backdoor:Win32/Hostil.F Microsoft Trojan.PWS.Tanspy
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.14809
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.15465
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.15166
Backdoor:Win32/Hostil.F Microsoft Trojan.DownLoader.15130
Backdoor:Win32/Hostil.F Microsoft BackDoor.Ack

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.