Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.j aliases:

Name Vendor Dr.Web classification name
New Malware.j McAfee Trojan.MulDrop.859
New Malware.j McAfee Trojan.PWS.LDPinch.165
New Malware.j McAfee BackDoor.Generic.1247
New Malware.j McAfee Trojan.PWS.Banker.based
New Malware.j McAfee Win32.HLLM.Foo.32800
New Malware.j McAfee BackDoor.Generic.1201
New Malware.j McAfee Trojan.Hanspy
New Malware.j McAfee Win32.Shpo
New Malware.j McAfee Trojan.DownLoader.398
New Malware.j McAfee Trojan.MulDrop.2532
New Malware.j McAfee Trojan.DownLoader.6912
New Malware.j McAfee Trojan.DownLoader.6913
New Malware.j McAfee Trojan.DownLoader.6914
New Malware.j McAfee Trojan.DownLoader.6911
New Malware.j McAfee Trojan.DownLoader.6910
New Malware.j McAfee Trojan.DownLoader.6816
New Malware.j McAfee Trojan.PWS.LDPinch.751
New Malware.j McAfee Trojan.PWS.LDPinch.750
New Malware.j McAfee Trojan.MulDrop.2902
New Malware.j McAfee BackDoor.Haxdoor.205
New Malware.j McAfee Trojan.DownLoader.10544
New Malware.j McAfee Trojan.PWS.Legmir.481
New Malware.j McAfee Trojan.MulDrop.3171
New Malware.j McAfee Trojan.PWS.LDPinch.746
New Malware.j McAfee Trojan.DownLoader.5270
New Malware.j McAfee Adware.Nova
New Malware.j McAfee BackDoor.Medbot
New Malware.j McAfee Trojan.DownLoader.5360
New Malware.j McAfee BackDoor.IRC.Rizalof
New Malware.j McAfee Trojan.StartPage.1238
New Malware.j McAfee Trojan.DownLoader.6856
New Malware.j McAfee Trojan.DownLoader.6857
New Malware.j McAfee Trojan.DownLoader.6852
New Malware.j McAfee Trojan.DownLoader.6854
New Malware.j McAfee Trojan.PWS.LDPinch.739
New Malware.j McAfee Trojan.DownLoader.6847
New Malware.j McAfee Trojan.Proxy.696
New Malware.j McAfee Trojan.DownLoader.1759
New Malware.j McAfee BackDoor.IRC.Simplbot
New Malware.j McAfee Trojan.AVKill.144
New Malware.j McAfee Trojan.PWS.DialPass
New Malware.j McAfee BackDoor.DSNX
New Malware.j McAfee Trojan.MulDrop.2936
New Malware.j McAfee Trojan.DownLoader.5847
New Malware.j McAfee Trojan.DownLoader.4955
New Malware.j McAfee Trojan.DownLoader.5388
New Malware.j McAfee Trojan.DownLoader.6773
New Malware.j McAfee Trojan.DownLoader.5416
New Malware.j McAfee Trojan.PWS.GoldSpy
New Malware.j McAfee Trojan.MulDrop.3274

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.