Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.j aliases:

Name Vendor Dr.Web classification name
New Malware.j McAfee Win32.HLLW.Agobot.4
New Malware.j McAfee Trojan.Wmpatch
New Malware.j McAfee Trojan.Seekboy
New Malware.j McAfee Trojan.PWS.Qqpass
New Malware.j McAfee Trojan.StartPage.684
New Malware.j McAfee Trojan.PWS.Bepaq
New Malware.j McAfee Trojan.PWS.Banker
New Malware.j McAfee Trojan.PWS.Banker.398
New Malware.j McAfee BackDoor.Generic.1004
New Malware.j McAfee Trojan.Slime.26266
New Malware.j McAfee Trojan.PWS.Legmir.221
New Malware.j McAfee Trojan.PWS.Sincom
New Malware.j McAfee Trojan.PWS.Legmir.177
New Malware.j McAfee Trojan.PWS.Executant
New Malware.j McAfee Trojan.Proxy.467
New Malware.j McAfee Trojan.PWS.Orange
New Malware.j McAfee Trojan.PWS.Legmir.185
New Malware.j McAfee Trojan.PWS.Inteter
New Malware.j McAfee Trojan.Aim
New Malware.j McAfee Trojan.PWS.Money
New Malware.j McAfee Trojan.SpmBot
New Malware.j McAfee BackDoor.Minihgz
New Malware.j McAfee Trojan.Iahonor
New Malware.j McAfee Trojan.PWS.LDPinch.134
New Malware.j McAfee Trojan.PWS.Dremn
New Malware.j McAfee Trojan.Dluca
New Malware.j McAfee Trojan.DownLoader.2401
New Malware.j McAfee Trojan.Slime
New Malware.j McAfee Dialer.Tmix
New Malware.j McAfee Trojan.DownLoader.270
New Malware.j McAfee Trojan.DownLoader.1001
New Malware.j McAfee Trojan.Flood.22016
New Malware.j McAfee Trojan.DownLoader.694
New Malware.j McAfee Trojan.Spabot
New Malware.j McAfee BackDoor.WinShell.50
New Malware.j McAfee BackDoor.Generic.952
New Malware.j McAfee BackDoor.Bordertroy
New Malware.j McAfee Trojan.IdentSpy
New Malware.j McAfee Win32.HLLW.Chum
New Malware.j McAfee BackDoor.Winsta
New Malware.j McAfee BackDoor.Netsnake
New Malware.j McAfee BackDoor.Nethief.51
New Malware.j McAfee BackDoor.Metshell
New Malware.j McAfee BackDoor.Litmus.203
New Malware.j McAfee BackDoor.Iroffer.13
New Malware.j McAfee BackDoor.IRC.Sdbot.279
New Malware.j McAfee BackDoor.Hackamy
New Malware.j McAfee BackDoor.Lana.1
New Malware.j McAfee BackDoor.Lookup
New Malware.j McAfee BackDoor.CodBot

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.