Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.h aliases:

Name Vendor Dr.Web classification name
New Malware.h McAfee Trojan.Packed.511
New Malware.h McAfee Trojan.MulDrop.7998
New Malware.h McAfee Trojan.MulDrop.7391
New Malware.h McAfee Trojan.MulDrop.8017
New Malware.h McAfee Trojan.MulDrop.8006
New Malware.h McAfee Trojan.MulDrop.8075
New Malware.h McAfee Trojan.MulDrop.7425
New Malware.h McAfee Trojan.MulDrop.1697
New Malware.h McAfee Trojan.DownLoad.3866
New Malware.h McAfee Trojan.DownLoad.3766
New Malware.h McAfee Trojan.DownLoad.3750
New Malware.h McAfee Trojan.DownLoad.3680
New Malware.h McAfee Trojan.DownLoad.3679
New Malware.h McAfee Trojan.DownLoad.3872
New Malware.h McAfee Trojan.PWS.Banker.3464
New Malware.h McAfee BackDoor.Pigeon.11728
New Malware.h McAfee Trojan.Pigmail
New Malware.h McAfee BackDoor.Mjc
New Malware.h McAfee Trojan.DownLoader.52991
New Malware.h McAfee Trojan.MulDrop.8347
New Malware.h McAfee Win32.Aliz.4098
New Malware.h McAfee BackDoor.Prone
New Malware.h McAfee Trojan.Packed.143
New Malware.h McAfee Trojan.DownLoader.28640
New Malware.h McAfee Trojan.DownLoader.46242
New Malware.h McAfee BackDoor.Xbot
New Malware.h McAfee BackDoor.Dsocks.10
New Malware.h McAfee BackDoor.BotNet.32
New Malware.h McAfee BackDoor.BOrifice.11
New Malware.h McAfee Trojan.MulDrop.441
New Malware.h McAfee BackDoor.HackDef.117
New Malware.h McAfee Trojan.DownLoader.6633
New Malware.h McAfee Trojan.PWS.Lespy
New Malware.h McAfee BackDoor.Pigeon.712
New Malware.h McAfee Trojan.PWS.Gamania.7274
New Malware.h McAfee Win32.HLLM.Limar.2361
New Malware.h McAfee Trojan.Baf
New Malware.h McAfee Tool.Pwdump
New Malware.h McAfee BackDoor.Pigeon.194
New Malware.h McAfee BackDoor.Pigeon.210
New Malware.h McAfee Trojan.Qqlog
New Malware.h McAfee BackDoor.Pigeon.8946
New Malware.h McAfee BackDoor.Pigeon.1310
New Malware.h McAfee BackDoor.Insti.79
New Malware.h McAfee Trojan.Tikl.101
New Malware.h McAfee BackDoor.Radmin.43
New Malware.h McAfee BackDoor.Beizhu.1042
New Malware.h McAfee BackDoor.Pigeon.10282
New Malware.h McAfee Trojan.PWS.LDPinch.532
New Malware.h McAfee BackDoor.Generic.520

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.