Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_MLWR-5 aliases:

Name Vendor Dr.Web classification name
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.8063
Mal_MLWR-5 Trend Micro Trojan.DownLoader.15746
Mal_MLWR-5 Trend Micro Trojan.DownLoader.33849
Mal_MLWR-5 Trend Micro Trojan.DownLoader.12452
Mal_MLWR-5 Trend Micro Trojan.Click.1956
Mal_MLWR-5 Trend Micro Trojan.Click.3534
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.4946
Mal_MLWR-5 Trend Micro Trojan.PWS.Gamania.2807
Mal_MLWR-5 Trend Micro Trojan.Click.3592
Mal_MLWR-5 Trend Micro Trojan.PWS.Mifeng
Mal_MLWR-5 Trend Micro Trojan.DownLoader.19959
Mal_MLWR-5 Trend Micro Trojan.DownLoader.19960
Mal_MLWR-5 Trend Micro Trojan.Packed.181
Mal_MLWR-5 Trend Micro BackDoor.Bifrost.262
Mal_MLWR-5 Trend Micro Trojan.DownLoader.13879
Mal_MLWR-5 Trend Micro BackDoor.Rpcs.78
Mal_MLWR-5 Trend Micro BackDoor.Assasin.41
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.2254
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.209
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.2642
Mal_MLWR-5 Trend Micro Trojan.DownLoader.7343
Mal_MLWR-5 Trend Micro Trojan.DownLoader.48978
Mal_MLWR-5 Trend Micro Trojan.PWS.Vipgsm
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.8254
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.105
Mal_MLWR-5 Trend Micro Trojan.PWS.Ragnarok
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.7169
Mal_MLWR-5 Trend Micro Trojan.Click.3182
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.7744
Mal_MLWR-5 Trend Micro Trojan.StartPage.1382
Mal_MLWR-5 Trend Micro Trojan.PWS.Legmir.898
Mal_MLWR-5 Trend Micro Win32.HLLW.Autoruner.374
Mal_MLWR-5 Trend Micro Trojan.Vanti
Mal_MLWR-5 Trend Micro Trojan.DownLoader.20154
Mal_MLWR-5 Trend Micro Trojan.PWS.Capay
Mal_MLWR-5 Trend Micro Trojan.DownLoader.33792
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.1674
Mal_MLWR-5 Trend Micro Win32.HLLW.Gavir.59
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.1249
Mal_MLWR-5 Trend Micro BackDoor.Pigeon.12949
Mal_MLWR-5 Trend Micro Trojan.MulDrop.3802
Mal_MLWR-5 Trend Micro Trojan.MulDrop.4527
Mal_MLWR-5 Trend Micro Trojan.PWS.Wsgame.1495
Mal_MLWR-5 Trend Micro Win32.HLLW.Autoruner.477
Mal_MLWR-5 Trend Micro Win32.HLLW.Autoruner.537
Mal_MLWR-5 Trend Micro BackDoor.PSClient
Mal_MLWR-5 Trend Micro Trojan.Tdx
Mal_MLWR-5 Trend Micro Trojan.DownLoader.58125
Mal_MLWR-5 Trend Micro Trojan.PWS.Wow
Mal_MLWR-5 Trend Micro Win32.HLLW.Autoruner.347

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.