Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Bloodhound.WordMacro aliases:

Name Vendor Dr.Web classification name
Bloodhound.WordMacro Symantec WM.Yaka
Bloodhound.WordMacro Symantec WM.WallPaper
Bloodhound.WordMacro Symantec WM.Vanoce
Bloodhound.WordMacro Symantec WM.Velop
Bloodhound.WordMacro Symantec WM.Urchin
Bloodhound.WordMacro Symantec WM.Vivi
Bloodhound.WordMacro Symantec WM.Uck
Bloodhound.WordMacro Symantec WM.Uhrjap
Bloodhound.WordMacro Symantec WM.Thebman
Bloodhound.WordMacro Symantec WM.Tiger
Bloodhound.WordMacro Symantec WM.Buero
Bloodhound.WordMacro Symantec WM.Tear
Bloodhound.WordMacro Symantec WM.Theatre
Bloodhound.WordMacro Symantec WM.Talon
Bloodhound.WordMacro Symantec WM.Tamago
Bloodhound.WordMacro Symantec WM.Taguchi
Bloodhound.WordMacro Symantec WM.Archie
Bloodhound.WordMacro Symantec WM.Skammy
Bloodhound.WordMacro Symantec WM.Surabaya
Bloodhound.WordMacro Symantec WM.Spooky
Bloodhound.WordMacro Symantec WM.Smmd
Bloodhound.WordMacro Symantec WM.Softwar
Bloodhound.WordMacro Symantec WM.Silvina
Bloodhound.WordMacro Symantec WM.SetMode
Bloodhound.WordMacro Symantec WM.Saver
Bloodhound.WordMacro Symantec WM.Innocence
Bloodhound.WordMacro Symantec WM.Rhappy
Bloodhound.WordMacro Symantec W97M.Rapi
Bloodhound.WordMacro Symantec WM.Simple
Bloodhound.WordMacro Symantec WM.Primit
Bloodhound.WordMacro Symantec WM.Pejuang
Bloodhound.WordMacro Symantec WM.Outlaw
Bloodhound.WordMacro Symantec WM.NPad
Bloodhound.WordMacro Symantec WM.Nop
Bloodhound.WordMacro Symantec WM.Jakutsk
Bloodhound.WordMacro Symantec WM.Donoso
Bloodhound.WordMacro Symantec WM.Morpheus
Bloodhound.WordMacro Symantec WM.Moscow
Bloodhound.WordMacro Symantec WM.Minimorph
Bloodhound.WordMacro Symantec WM.Target
Bloodhound.WordMacro Symantec WM.Macrel
Bloodhound.WordMacro Symantec WM.Mercado
Bloodhound.WordMacro Symantec WM.Pirata
Bloodhound.WordMacro Symantec WM.MDMA
Bloodhound.WordMacro Symantec WM.Magnum
Bloodhound.WordMacro Symantec WM.Weather
Bloodhound.WordMacro Symantec WM.Kompu
Bloodhound.WordMacro Symantec WM.Leonor
Bloodhound.WordMacro Symantec WM.India
Bloodhound.WordMacro Symantec WM.Kann

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.