Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.h aliases:

Name Vendor Dr.Web classification name
New Malware.h McAfee Trojan.StartPage.21269
New Malware.h McAfee Trojan.MulDrop.12876
New Malware.h McAfee Trojan.DownLoad.3788
New Malware.h McAfee Trojan.DownLoad.3720
New Malware.h McAfee Trojan.DownLoad.3907
New Malware.h McAfee Trojan.DownLoad.3690
New Malware.h McAfee Trojan.DownLoader.35933
New Malware.h McAfee Win32.HLLM.Beagle.39459
New Malware.h McAfee BackDoor.Iroffer.1310
New Malware.h McAfee Tool.Prockill
New Malware.h McAfee Tool.SQLck
New Malware.h McAfee BackDoor.IRC.Sdbot.449
New Malware.h McAfee Trojan.MulDrop.2054
New Malware.h McAfee BackDoor.NetBus.160
New Malware.h McAfee BackDoor.Iroffer.13
New Malware.h McAfee Program.TinyFTP.14
New Malware.h McAfee BackDoor.LMR.20
New Malware.h McAfee Program.RemoteAdmin
New Malware.h McAfee BackDoor.WebDor.58
New Malware.h McAfee BackDoor.Ducktoy.12
New Malware.h McAfee BackDoor.RemoteShell.37
New Malware.h McAfee BackDoor.Optix.131
New Malware.h McAfee BackDoor.Graybird.2049
New Malware.h McAfee Trojan.MulDrop.10220
New Malware.h McAfee Trojan.DownLoad.3758
New Malware.h McAfee Trojan.MulDrop.7706
New Malware.h McAfee Trojan.DownLoad.3886
New Malware.h McAfee Trojan.DownLoad.3890
New Malware.h McAfee Trojan.DownLoad.3813
New Malware.h McAfee BackDoor.HackDef.541
New Malware.h McAfee BackDoor.Bifrost.457
New Malware.h McAfee BackDoor.HackDef.279
New Malware.h McAfee BackDoor.Poison
New Malware.h McAfee Trojan.MulDrop.15895
New Malware.h McAfee Win32.HLLW.MyBot.78
New Malware.h McAfee BackDoor.Iroffer.1435
New Malware.h McAfee Trojan.DownLoader.56662
New Malware.h McAfee Trojan.Starman
New Malware.h McAfee Trojan.PWS.Qqshou
New Malware.h McAfee BackDoor.DarkMoon.138
New Malware.h McAfee BackDoor.Generic.1664
New Malware.h McAfee Trojan.MulDrop.4821
New Malware.h McAfee Trojan.LowZones.198
New Malware.h McAfee Trojan.LowZones.194
New Malware.h McAfee Trojan.Hooker.180
New Malware.h McAfee Trojan.Hooker.205
New Malware.h McAfee BackDoor.Guptachar.20
New Malware.h McAfee Trojan.PWS.LDPinch.3270
New Malware.h McAfee Exploit.DCom.9
New Malware.h McAfee Trojan.KeyLogger.2256

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.