Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic PWS.y aliases:

Name Vendor Dr.Web classification name
Generic PWS.y McAfee Trojan.PWS.Qqpass.2618
Generic PWS.y McAfee Trojan.DownLoad.31523
Generic PWS.y McAfee Trojan.PWS.Qqpass.2626
Generic PWS.y McAfee Trojan.PWS.Qqrobber.415
Generic PWS.y McAfee Trojan.PWS.Qqpass.2613
Generic PWS.y McAfee Trojan.PWS.Legmir.343
Generic PWS.y McAfee Trojan.Proxy.3099
Generic PWS.y McAfee Trojan.Dalog.10
Generic PWS.y McAfee Trojan.Peflog.30
Generic PWS.y McAfee Trojan.PWS.LDPinch.222
Generic PWS.y McAfee Trojan.KeyLogger.69
Generic PWS.y McAfee Tool.Pwdump
Generic PWS.y McAfee Adware.Cdn.457
Generic PWS.y McAfee Trojan.PWS.Wsgame.10867
Generic PWS.y McAfee BackDoor.Generic.1476
Generic PWS.y McAfee Trojan.PWS.LDPinch.212
Generic PWS.y McAfee Trojan.Keyer
Generic PWS.y McAfee Trojan.PWS.LDPinch.244
Generic PWS.y McAfee Tool.Reboot.20482
Generic PWS.y McAfee Tool.Arp
Generic PWS.y McAfee Program.ProcessLogger
Generic PWS.y McAfee Trojan.Pclog.53
Generic PWS.y McAfee Trojan.Hitpop.1036
Generic PWS.y McAfee Trojan.BeagleProxy
Generic PWS.y McAfee Trojan.PWS.Aolbill
Generic PWS.y McAfee BackDoor.Huai.1328
Generic PWS.y McAfee Trojan.DownLoader.44687
Generic PWS.y McAfee Trojan.DownLoader.44754
Generic PWS.y McAfee Trojan.DownLoader.44569
Generic PWS.y McAfee Trojan.DownLoader.15912
Generic PWS.y McAfee Trojan.KeyLogger.386
Generic PWS.y McAfee Trojan.DownLoader.44672
Generic PWS.y McAfee Trojan.DownLoader.43228
Generic PWS.y McAfee Trojan.PWS.Giveyou
Generic PWS.y McAfee BackDoor.Pigeon.7216
Generic PWS.y McAfee BackDoor.Wdoor.13
Generic PWS.y McAfee BackDoor.Pigeon.7348
Generic PWS.y McAfee BackDoor.Pigeon.1637
Generic PWS.y McAfee BackDoor.LaLa.142
Generic PWS.y McAfee BackDoor.Manga
Generic PWS.y McAfee BackDoor.Pigeon.9893
Generic PWS.y McAfee Trojan.DownLoader.44759
Generic PWS.y McAfee Trojan.KeyLogger.378
Generic PWS.y McAfee BackDoor.IRC.Sdbot.1608
Generic PWS.y McAfee BackDoor.Pigeon.13451
Generic PWS.y McAfee Trojan.DownLoader.44833
Generic PWS.y McAfee BackDoor.Pigeon.7278
Generic PWS.y McAfee BackDoor.Pigeon.2764
Generic PWS.y McAfee BackDoor.Netspy.10
Generic PWS.y McAfee BackDoor.Pigeon.6154

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.