Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.h aliases:

Name Vendor Dr.Web classification name
New Malware.h McAfee Exploit.Lsass
New Malware.h McAfee Trojan.LowZones.140
New Malware.h McAfee BackDoor.Servu.5009
New Malware.h McAfee Exploit.WebDav
New Malware.h McAfee VirusConstructor.ClearLogs
New Malware.h McAfee Trojan.IPCScan
New Malware.h McAfee Trojan.Firedaemon
New Malware.h McAfee BackDoor.Servu.5000
New Malware.h McAfee BackDoor.Servu.50011
New Malware.h McAfee BackDoor.Servu.5004
New Malware.h McAfee BackDoor.Servu.5100
New Malware.h McAfee BackDoor.Servu.5200
New Malware.h McAfee Trojan.DownLoader.2836
New Malware.h McAfee Trojan.MulDrop.2978
New Malware.h McAfee Trojan.StartPage.372
New Malware.h McAfee Trojan.MulDrop.323
New Malware.h McAfee Win32.IRC.Bot.based
New Malware.h McAfee BackDoor.Servu.5201
New Malware.h McAfee Trojan.StartPage.564
New Malware.h McAfee Win32.HLLW.Bobik
New Malware.h McAfee BackDoor.Pipecmd
New Malware.h McAfee Trojan.Logkill
New Malware.h McAfee Trojan.DownLoader.740
New Malware.h McAfee Trojan.Proxy.603
New Malware.h McAfee Trojan.Ranky
New Malware.h McAfee Trojan.Proxy.122
New Malware.h McAfee Trojan.MulDrop.1679
New Malware.h McAfee Trojan.LowZones
New Malware.h McAfee Trojan.MulDrop.2966
New Malware.h McAfee Trojan.DownLoader.4401
New Malware.h McAfee Trojan.DownLoader.4367
New Malware.h McAfee Trojan.DownLoader.4876
New Malware.h McAfee Win32.HLLW.SpyBot
New Malware.h McAfee BackDoor.Dumaru.17
New Malware.h McAfee BackDoor.Webcam
New Malware.h McAfee BackDoor.Haxitos
New Malware.h McAfee BackDoor.Generic.832
New Malware.h McAfee BackDoor.Optix.50
New Malware.h McAfee BackDoor.Pigeon.47
New Malware.h McAfee Trojan.PWS.Punch
New Malware.h McAfee Trojan.NtRootKit.21
New Malware.h McAfee BackDoor.Fxsvc
New Malware.h McAfee BackDoor.Graybird
New Malware.h McAfee BackDoor.HackDef.120
New Malware.h McAfee BackDoor.DarkMoon.60
New Malware.h McAfee BackDoor.PeepView.202
New Malware.h McAfee BackDoor.RC
New Malware.h McAfee BackDoor.Servu.4100
New Malware.h McAfee FDOS.Syn.13
New Malware.h McAfee Exploit.Sfind

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.