Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_SHND-4 aliases:

Name Vendor Dr.Web classification name
Mal_SHND-4 Trend Micro Win32.HLLW.Texmer.51
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.7147
Mal_SHND-4 Trend Micro Win32.HLLW.Autohit.9684
Mal_SHND-4 Trend Micro Win32.HLLW.Autohit.8225
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.6614
Mal_SHND-4 Trend Micro Win32.HLLW.Autohit.9995
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.2488
Mal_SHND-4 Trend Micro Win32.HLLW.Muds
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.311
Mal_SHND-4 Trend Micro Win32.HLLM.Generic.454
Mal_SHND-4 Trend Micro Win32.HLLW.Siggen.73
Mal_SHND-4 Trend Micro Win32.HLLW.Autohit.6348
Mal_SHND-4 Trend Micro Win32.HLLW.Texmer.54
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.2088
Mal_SHND-4 Trend Micro Joke.Forgery.165
Mal_SHND-4 Trend Micro Win32.HLLW.Antinny.62
Mal_SHND-4 Trend Micro Trojan.MulDrop.13018
Mal_SHND-4 Trend Micro Trojan.Siggen.59492
Mal_SHND-4 Trend Micro Win32.HLLW.Texmer
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.7720
Mal_SHND-4 Trend Micro Win32.HLLW.Winny
Mal_SHND-4 Trend Micro Trojan.Siggen.2100
Mal_SHND-4 Trend Micro Win32.HLLW.Antinny.61
Mal_SHND-4 Trend Micro BackDoor.Padlizsan
Mal_SHND-4 Trend Micro Trojan.MulDrop.32615
Mal_SHND-4 Trend Micro Trojan.MulDrop.12720
Mal_SHND-4 Trend Micro Trojan.Siggen1.5714
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.7345
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.6373
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.627
Mal_SHND-4 Trend Micro Trojan.PWS.Banker.28812
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.6735
Mal_SHND-4 Trend Micro Win32.HLLW.Autohit.7125
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.6487
Mal_SHND-4 Trend Micro Win32.HLLW.Texmer.50
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.6260
Mal_SHND-4 Trend Micro Trojan.PWS.LDPinch.1027
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.6157
Mal_SHND-4 Trend Micro Win32.HLLW.Obfuscated
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.996
Mal_SHND-4 Trend Micro Trojan.Totok
Mal_SHND-4 Trend Micro Win32.HLLW.Tin
Mal_SHND-4 Trend Micro BackDoor.BlackHole.2317
Mal_SHND-4 Trend Micro Win32.HLLW.Autohit.9263
Mal_SHND-4 Trend Micro Trojan.Siggen.62519
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.origin
Mal_SHND-4 Trend Micro Trojan.PWS.Banker.30929
Mal_SHND-4 Trend Micro Win32.HLLW.Cung
Mal_SHND-4 Trend Micro Trojan.MulDrop.11171
Mal_SHND-4 Trend Micro Win32.HLLW.Autoruner.14274

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies