Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Malware.Microjoin.1 aliases:

Name Vendor Dr.Web classification name
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.7427
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.877
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.4679
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.876
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6319
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.16584
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.1149
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.18392
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.4525
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.7411
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.10267
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6895
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6909
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.977
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.636
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.763
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6226
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.4632
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.8659
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.4659
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.14725
Malware.Microjoin.1 VirusBlokAda Trojan.PWS.LDPinch.199
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.3658
Malware.Microjoin.1 VirusBlokAda Trojan.PWS.LDPinch.133
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.1248
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.17236
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6433
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.5041
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6431
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6423
Malware.Microjoin.1 VirusBlokAda Trojan.DownLoader.59485
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.5496
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6908
Malware.Microjoin.1 VirusBlokAda Trojan.Microjo.25
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.34066
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.34067
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.34068
Malware.Microjoin.1 VirusBlokAda BackDoor.IRC.Sdbot.439
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.4154
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.31927
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.6365
Malware.Microjoin.1 VirusBlokAda Trojan.DownLoad.46014
Malware.Microjoin.1 VirusBlokAda BackDoor.Pigeon.5042
Malware.Microjoin.1 VirusBlokAda Trojan.PWS.Wsgame.17775
Malware.Microjoin.1 VirusBlokAda Trojan.PWS.Wsgame.18045
Malware.Microjoin.1 VirusBlokAda Trojan.PWS.Wsgame.17930
Malware.Microjoin.1 VirusBlokAda Trojan.DownLoad.45213
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.origin
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.34163
Malware.Microjoin.1 VirusBlokAda Trojan.MulDrop.35746

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.