Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Exploit-CodeBase aliases:

Name Vendor Dr.Web classification name
Exploit-CodeBase McAfee Trojan.PWS.Rina
Exploit-CodeBase McAfee Trojan.MulDrop.1234
Exploit-CodeBase McAfee Trojan.MulDrop.1264
Exploit-CodeBase McAfee Trojan.MulDrop.1265
Exploit-CodeBase McAfee BackDoor.Afcore.27
Exploit-CodeBase McAfee Trojan.DownLoader.770
Exploit-CodeBase McAfee Trojan.MulDrop.1254
Exploit-CodeBase McAfee Trojan.StartPage.282
Exploit-CodeBase McAfee Trojan.MulDrop.840
Exploit-CodeBase McAfee Trojan.MulDrop.1034
Exploit-CodeBase McAfee Trojan.MulDrop.1235
Exploit-CodeBase McAfee BackDoor.Reni
Exploit-CodeBase McAfee Trojan.MulDrop.1258
Exploit-CodeBase McAfee Win32.HLLM.Capside
Exploit-CodeBase McAfee Win32.HLLM.Generic.243
Exploit-CodeBase McAfee Trojan.MulDrop.1036
Exploit-CodeBase McAfee Trojan.MulDrop.1415
Exploit-CodeBase McAfee Trojan.MulDrop.1723
Exploit-CodeBase McAfee Trojan.MulDrop.1033
Exploit-CodeBase McAfee Trojan.DownLoader.2349
Exploit-CodeBase McAfee Exploit.MhtRedir
Exploit-CodeBase McAfee Trojan.DownLoader.929
Exploit-CodeBase McAfee Trojan.DownLoader.3117
Exploit-CodeBase McAfee Trojan.StartPage
Exploit-CodeBase McAfee Trojan.StartPage.435
Exploit-CodeBase McAfee Trojan.PWS.LDPinch.255
Exploit-CodeBase McAfee Trojan.MulDrop.1326
Exploit-CodeBase McAfee VBS.Psyme
Exploit-CodeBase McAfee Trojan.SelfExecHtml
Exploit-CodeBase McAfee Trojan.MulDrop.913
Exploit-CodeBase McAfee Trojan.Rieler
Exploit-CodeBase McAfee Exploit.CodeBase
Exploit-CodeBase McAfee BackDoor.Pigeon.5
Exploit-CodeBase McAfee Trojan.MulDrop.2526
Exploit-CodeBase McAfee Trojan.Runmem
Exploit-CodeBase McAfee Win32.HLLM.Foo.54784
Exploit-CodeBase McAfee Adware.Ezula
Exploit-CodeBase McAfee Trojan.Click.610
Exploit-CodeBase McAfee Trojan.DownLoader.961
Exploit-CodeBase McAfee Trojan.Fstart
Exploit-CodeBase McAfee Trojan.DownLoader.6084
Exploit-CodeBase McAfee Trojan.DownLoader.7680
Exploit-CodeBase McAfee Trojan.DownLoader.6144
Exploit-CodeBase McAfee Trojan.Harnig
Exploit-CodeBase McAfee Trojan.MulDrop.1032
Exploit-CodeBase McAfee Trojan.DownLoader.2104
Exploit-CodeBase McAfee Trojan.DownLoader.295
Exploit-CodeBase McAfee Trojan.MulDrop.825
Exploit-CodeBase McAfee Trojan.MulDrop.1035
Exploit-CodeBase McAfee Trojan.MulDrop.1689

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.