Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.h aliases:

Name Vendor Dr.Web classification name
New Malware.h McAfee Win32.HLLW.Bropia
New Malware.h McAfee BackDoor.IRC.Autobot
New Malware.h McAfee Trojan.Stealther
New Malware.h McAfee BackDoor.Generic.944
New Malware.h McAfee BackDoor.Optix
New Malware.h McAfee Trojan.PWS.LDPinch.241
New Malware.h McAfee Trojan.PWS.GWGhost.30
New Malware.h McAfee Trojan.MulDrop.2077
New Malware.h McAfee Trojan.MulDrop.1667
New Malware.h McAfee Trojan.DownLoader.2193
New Malware.h McAfee Trojan.Isbar.189
New Malware.h McAfee Trojan.Noshare
New Malware.h McAfee BackDoor.EggDrop
New Malware.h McAfee BackDoor.Theef.201
New Malware.h McAfee BackDoor.ProRat.19
New Malware.h McAfee BackDoor.OptixPro.132
New Malware.h McAfee BackDoor.Theef.210
New Malware.h McAfee BackDoor.Cia
New Malware.h McAfee BackDoor.BlueEye.10
New Malware.h McAfee BackDoor.Assassin.11
New Malware.h McAfee BackDoor.Assassin.20
New Malware.h McAfee Exploit.DCom.41
New Malware.h McAfee BackDoor.Oscar
New Malware.h McAfee Win32.HLLM.MyDoom.based
New Malware.h McAfee Trojan.LowZones.133
New Malware.h McAfee Win32.HLLW.MyBot
New Malware.h McAfee BackDoor.IRC.Sdbot.228
New Malware.h McAfee BackDoor.IRC.Sdbot.based
New Malware.h McAfee Win32.HLLW.ForBot
New Malware.h McAfee Win32.HLLW.Randex.45056
New Malware.h McAfee Win32.HLLW.Kelvin
New Malware.h McAfee Win32.HLLW.Agobot
New Malware.h McAfee Trojan.Click.646
New Malware.h McAfee BackDoor.Ralf
New Malware.h McAfee Trojan.SpyRadar
New Malware.h McAfee DDoS.Smurf
New Malware.h McAfee Trojan.PWS.Dside
New Malware.h McAfee Win32.HLLW.Maddis
New Malware.h McAfee Trojan.Proxy.72
New Malware.h McAfee FDOS.Kalibre
New Malware.h McAfee Trojan.MulDrop.433
New Malware.h McAfee Trojan.Stebatch
New Malware.h McAfee Trojan.MulDrop.1129
New Malware.h McAfee Trojan.MulDrop.1175
New Malware.h McAfee Trojan.Troll
New Malware.h McAfee Trojan.DownLoader.465
New Malware.h McAfee Trojan.Cmdget
New Malware.h McAfee Trojan.Isbar.241
New Malware.h McAfee Trojan.PurityAd
New Malware.h McAfee Trojan.DownLoader.1986

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.