Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

MalwareScope.Worm.Viking.2 aliases:

Name Vendor Dr.Web classification name
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.9767
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.Inject.281
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.5024
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.4598
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.4378
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.4676
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Bonque
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.5513
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.Nsanti.Packed
MalwareScope.Worm.Viking.2 VirusBlokAda Win32.HLLW.Gavir.54
MalwareScope.Worm.Viking.2 VirusBlokAda Win32.HLLW.Gavir.64
MalwareScope.Worm.Viking.2 VirusBlokAda Win32.HLLW.Gavir.59
MalwareScope.Worm.Viking.2 VirusBlokAda BackDoor.Pigeon.13735
MalwareScope.Worm.Viking.2 VirusBlokAda Win32.HLLW.Autoruner.1891
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.DownLoader.13881
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.6481
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania.10782
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania.4423
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.6880
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.5909
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Zlt
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania.7279
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Legmir.693
MalwareScope.Worm.Viking.2 VirusBlokAda BackDoor.Beizhu.250
MalwareScope.Worm.Viking.2 VirusBlokAda BackDoor.Pigeon.676
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.18159
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.MulDrop.17071
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Qqpass.279
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.Packed.140
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.6885
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.Vanti.316
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.Vanti
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.1652
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.1702
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.DownLoader.14757
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.DownLoader.18696
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania.7927
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.6667
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.DownLoader.14306
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.DownLoader.22174
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.NtRootKit.161
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania.5967
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania.5504
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.4028
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.6448
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Wsgame.6272
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.PWS.Gamania.11850
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.Vanti.335
MalwareScope.Worm.Viking.2 VirusBlokAda Trojan.Hooker.145

1 2 3 4 5 6 7 8 9

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.