Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.f aliases:

Name Vendor Dr.Web classification name
New Malware.f McAfee Win32.HLLM.Bagz
New Malware.f McAfee Trojan.DownLoader.3149
New Malware.f McAfee Trojan.Iesnif
New Malware.f McAfee BackDoor.DMoon.52
New Malware.f McAfee Trojan.PWS.Banker.718
New Malware.f McAfee Trojan.MulDrop.69
New Malware.f McAfee Trojan.MulDrop.960
New Malware.f McAfee Trojan.DownLoader.1875
New Malware.f McAfee Trojan.MulDrop.2477
New Malware.f McAfee Trojan.MulDrop.310
New Malware.f McAfee Trojan.PWS.Legmir.358
New Malware.f McAfee Win32.IRC.Bot.based
New Malware.f McAfee Win32.HLLW.MyBot
New Malware.f McAfee Trojan.Polo
New Malware.f McAfee Trojan.PWS.Legmir.344
New Malware.f McAfee Trojan.MulDrop.2685
New Malware.f McAfee Flooder.Xia
New Malware.f McAfee Trojan.MulDrop.2558
New Malware.f McAfee Trojan.MulDrop.2684
New Malware.f McAfee Trojan.Morav
New Malware.f McAfee Trojan.MulDrop.2751
New Malware.f McAfee BackDoor.IRC.Wisdom
New Malware.f McAfee BackDoor.IRC.Sdbot
New Malware.f McAfee BackDoor.Nuclearat.10
New Malware.f McAfee BackDoor.Pigeon.5
New Malware.f McAfee BackDoor.Graybird
New Malware.f McAfee Trojan.PWS.Hangame
New Malware.f McAfee Win32.HLLW.MyBot.based
New Malware.f McAfee Trojan.LowZones.110
New Malware.f McAfee Trojan.MulDrop.1161
New Malware.f McAfee Trojan.Click.903
New Malware.f McAfee Trojan.MulDrop.2726
New Malware.f McAfee Trojan.Proxy.578
New Malware.f McAfee Trojan.DownLoader.4869
New Malware.f McAfee Trojan.Click.852
New Malware.f McAfee BackDoor.Bifrost.11
New Malware.f McAfee Trojan.MulDrop.3109
New Malware.f McAfee Trojan.PWS.Lineage
New Malware.f McAfee BackDoor.PcClient
New Malware.f McAfee Trojan.StartPage.1268
New Malware.f McAfee Win32.Detox
New Malware.f McAfee BackDoor.IRC.Wbug
New Malware.f McAfee Trojan.DownLoader.8483
New Malware.f McAfee Trojan.StartPage.1392
New Malware.f McAfee Win32.HLLP.Whboy
New Malware.f McAfee Trojan.DownLoader.15168
New Malware.f McAfee Trojan.Onlyone
New Malware.f McAfee BackDoor.IRC.Sdbot.1721
New Malware.f McAfee BackDoor.Generic.864
New Malware.f McAfee Trojan.PWS.Drcom

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.