Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

DNSChanger.t aliases:

Name Vendor Dr.Web classification name
DNSChanger.t McAfee BackDoor.Tdss.62
DNSChanger.t McAfee BackDoor.Tdss.63
DNSChanger.t McAfee BackDoor.Tdss.59
DNSChanger.t McAfee BackDoor.Tdss.51
DNSChanger.t McAfee BackDoor.Geyekr
DNSChanger.t McAfee Trojan.Virtumod.1937
DNSChanger.t McAfee BackDoor.Tdss.43
DNSChanger.t McAfee Trojan.Packed.2479
DNSChanger.t McAfee BackDoor.Tdss.407
DNSChanger.t McAfee Trojan.Packed.637
DNSChanger.t McAfee BackDoor.Tdss.44
DNSChanger.t McAfee BackDoor.Tdss.282
DNSChanger.t McAfee BackDoor.Tdss.266
DNSChanger.t McAfee BackDoor.Tdss.based.1
DNSChanger.t McAfee Trojan.Packed.520
DNSChanger.t McAfee BackDoor.Tdss.342
DNSChanger.t McAfee BackDoor.Tdss.403
DNSChanger.t McAfee Trojan.Packed.444
DNSChanger.t McAfee BackDoor.Tdss.510
DNSChanger.t McAfee BackDoor.Tdss.248
DNSChanger.t McAfee BackDoor.Tdss.68
DNSChanger.t McAfee BackDoor.Tdss.546
DNSChanger.t McAfee BackDoor.Tdss.228
DNSChanger.t McAfee BackDoor.Tdss.280
DNSChanger.t McAfee BackDoor.Tdss.255
DNSChanger.t McAfee BackDoor.Tdss.363
DNSChanger.t McAfee BackDoor.Tdss.262
DNSChanger.t McAfee BackDoor.Tdss.466
DNSChanger.t McAfee BackDoor.Siggen.580
DNSChanger.t McAfee BackDoor.Tdss.314
DNSChanger.t McAfee BackDoor.Tdss.316
DNSChanger.t McAfee BackDoor.Tdss.268
DNSChanger.t McAfee BackDoor.Tdss.369
DNSChanger.t McAfee BackDoor.Geyekr.5
DNSChanger.t McAfee BackDoor.Geyekr.4
DNSChanger.t McAfee BackDoor.Tdss.214
DNSChanger.t McAfee BackDoor.Tdss.528
DNSChanger.t McAfee BackDoor.Tdss.317
DNSChanger.t McAfee BackDoor.Tdss.57
DNSChanger.t McAfee Trojan.Packed.2788
DNSChanger.t McAfee BackDoor.Tdss.425
DNSChanger.t McAfee BackDoor.BotNet.109
DNSChanger.t McAfee BackDoor.Tdss.524
DNSChanger.t McAfee BackDoor.Tdss.541
DNSChanger.t McAfee BackDoor.Tdss.116
DNSChanger.t McAfee Trojan.Siggen.5012
DNSChanger.t McAfee BackDoor.Tdss.562
DNSChanger.t McAfee BackDoor.Tdss.579
DNSChanger.t McAfee BackDoor.Tdss.73
DNSChanger.t McAfee BackDoor.Tdss.309

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.