Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

HEUR/HTML.Malware aliases:

Name Vendor Dr.Web classification name
HEUR/HTML.Malware Avira Trojan.Click.24526
HEUR/HTML.Malware Avira Exploit.PDF.84
HEUR/HTML.Malware Avira Trojan.DownLoader.38030
HEUR/HTML.Malware Avira Trojan.DownLoad.30844
HEUR/HTML.Malware Avira Trojan.DownLoader.38125
HEUR/HTML.Malware Avira Exploit.PDF.83
HEUR/HTML.Malware Avira Exploit.PDF.90
HEUR/HTML.Malware Avira Exploit.PDF.81
HEUR/HTML.Malware Avira Exploit.PDF.85
HEUR/HTML.Malware Avira Exploit.PDF.79
HEUR/HTML.Malware Avira Exploit.MS06-014.46
HEUR/HTML.Malware Avira Exploit.IFrame.44
HEUR/HTML.Malware Avira VBS.Generic.466
HEUR/HTML.Malware Avira Trojan.StartPage.1204
HEUR/HTML.Malware Avira Exploit.MhtRedir
HEUR/HTML.Malware Avira Trojan.Click.18677
HEUR/HTML.Malware Avira Trojan.Click.18604
HEUR/HTML.Malware Avira Trojan.Click.3609
HEUR/HTML.Malware Avira Trojan.Click.4033
HEUR/HTML.Malware Avira Trojan.Click.3602
HEUR/HTML.Malware Avira Trojan.Click.3605
HEUR/HTML.Malware Avira Trojan.Click.3607
HEUR/HTML.Malware Avira Trojan.Click.3603
HEUR/HTML.Malware Avira Trojan.Click.3606
HEUR/HTML.Malware Avira Trojan.Click.3604
HEUR/HTML.Malware Avira Trojan.Click.3599
HEUR/HTML.Malware Avira Trojan.Click.3608
HEUR/HTML.Malware Avira VBS.Generic.537
HEUR/HTML.Malware Avira WScript.TheFly.2
HEUR/HTML.Malware Avira Exploit.IFrame.46
HEUR/HTML.Malware Avira VBS.Terrosist
HEUR/HTML.Malware Avira JS.Click.1
HEUR/HTML.Malware Avira JS.Click.3
HEUR/HTML.Malware Avira Trojan.DownLoader.33840
HEUR/HTML.Malware Avira Trojan.Click.18605
HEUR/HTML.Malware Avira Trojan.StartPage.896
HEUR/HTML.Malware Avira Trojan.Click.18719
HEUR/HTML.Malware Avira Trojan.DownLoader.50222
HEUR/HTML.Malware Avira Trojan.DownLoader.36432
HEUR/HTML.Malware Avira Trojan.DownLoader.36536
HEUR/HTML.Malware Avira VBS.PackFor
HEUR/HTML.Malware Avira VBS.Kalamar
HEUR/HTML.Malware Avira JS.Siggen.7
HEUR/HTML.Malware Avira Trojan.Madshare
HEUR/HTML.Malware Avira Trojan.MulDrop.3092
HEUR/HTML.Malware Avira Trojan.DownLoader.38080
HEUR/HTML.Malware Avira VBS.PackFor.18
HEUR/HTML.Malware Avira VBS.PackFor.22
HEUR/HTML.Malware Avira VBS.PackFor.19
HEUR/HTML.Malware Avira VBS.PackFor.15

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.