Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Poly Win32 aliases:

Name Vendor Dr.Web classification name
New Poly Win32 McAfee BackDoor.BlackHole.origin
New Poly Win32 McAfee BackDoor.Pigeon.2254
New Poly Win32 McAfee Win32.HLLW.SpyBot
New Poly Win32 McAfee BackDoor.Dumaru.20
New Poly Win32 McAfee BackDoor.Bifrost
New Poly Win32 McAfee Trojan.PWS.LDPinch.133
New Poly Win32 McAfee BackDoor.Dumaru.23
New Poly Win32 McAfee Win32.HLLW.MyBot
New Poly Win32 McAfee Win32.Cocaine.22227
New Poly Win32 McAfee Win32.HLLW.MyBot.based
New Poly Win32 McAfee Win32.IRC.Bot
New Poly Win32 McAfee Trojan.DownLoader.13889
New Poly Win32 McAfee Trojan.PWS.Qqpass.284
New Poly Win32 McAfee Trojan.Spambot
New Poly Win32 McAfee Trojan.PWS.LDPinch.1217
New Poly Win32 McAfee Trojan.PWS.LDPinch.1394
New Poly Win32 McAfee Trojan.PWS.Maran
New Poly Win32 McAfee Trojan.PWS.LDPinch.1417
New Poly Win32 McAfee Trojan.PWS.LDPinch.1423
New Poly Win32 McAfee Trojan.PWS.LDPinch.1510
New Poly Win32 McAfee Trojan.PWS.LDPinch.1407
New Poly Win32 McAfee Trojan.PWS.LDPinch.1611
New Poly Win32 McAfee Trojan.PWS.LDPinch.1630
New Poly Win32 McAfee Trojan.PWS.LDPinch.1530
New Poly Win32 McAfee Win32.HLLM.Beagle
New Poly Win32 McAfee Trojan.DownLoader.30163
New Poly Win32 McAfee BackDoor.IRC.Sdbot.2923
New Poly Win32 McAfee Trojan.Inject.282
New Poly Win32 McAfee Trojan.MulDrop.9670
New Poly Win32 McAfee BackDoor.BlackHole.2067
New Poly Win32 McAfee Trojan.PWS.LDPinch.2252
New Poly Win32 McAfee Trojan.DownLoader.4708
New Poly Win32 McAfee Trojan.Spambot.2551
New Poly Win32 McAfee Trojan.MulDrop.13208
New Poly Win32 McAfee BackDoor.Pigeon.5326
New Poly Win32 McAfee Trojan.StartPage.20457
New Poly Win32 McAfee Trojan.PWS.Gamania.4653
New Poly Win32 McAfee BackDoor.Pigeon.4811
New Poly Win32 McAfee Trojan.Proxy.1824
New Poly Win32 McAfee BackDoor.Pigeon.9982
New Poly Win32 McAfee Trojan.DownLoader.31543
New Poly Win32 McAfee Trojan.PWS.GoldSpy
New Poly Win32 McAfee BackDoor.Huai.2342
New Poly Win32 McAfee BackDoor.Rejoice.107
New Poly Win32 McAfee BackDoor.Rejoice.113
New Poly Win32 McAfee Win32.HLLW.Autoruner.1530
New Poly Win32 McAfee BackDoor.Pigeon.2459
New Poly Win32 McAfee Trojan.MulDrop.17184
New Poly Win32 McAfee BackDoor.Pigeon.9877
New Poly Win32 McAfee BackDoor.Pigeon.12932

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.