Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.j aliases:

Name Vendor Dr.Web classification name
New Malware.j McAfee Trojan.DownLoader.2205
New Malware.j McAfee Trojan.DownLoader.3841
New Malware.j McAfee Trojan.DownLoader.4519
New Malware.j McAfee Trojan.DownLoader.1816
New Malware.j McAfee Trojan.Nosecur
New Malware.j McAfee Win32.HLLW.Shower.34816
New Malware.j McAfee Win32.HLLW.Yenik
New Malware.j McAfee Win32.HLLM.SunYanzi.2
New Malware.j McAfee Win32.HLLM.Yaha.based
New Malware.j McAfee Win32.HLLM.Weet
New Malware.j McAfee Win32.HLLW.Warpi
New Malware.j McAfee Trojan.Vorofer
New Malware.j McAfee Win32.HLLM.Generic.354
New Malware.j McAfee VBS.Generic.433
New Malware.j McAfee Trojan.DownLoader.4927
New Malware.j McAfee Trojan.Hidn
New Malware.j McAfee Trojan.PWS.Chigi
New Malware.j McAfee Trojan.Spamer
New Malware.j McAfee Trojan.Click.831
New Malware.j McAfee Trojan.PWS.Mabinogi
New Malware.j McAfee BackDoor.IRC.Sdbot.358
New Malware.j McAfee Trojan.StartPage.1112
New Malware.j McAfee Trojan.StartPage.1084
New Malware.j McAfee Trojan.StartPage.917
New Malware.j McAfee Trojan.MulDrop.2791
New Malware.j McAfee Trojan.DownLoader.3793
New Malware.j McAfee Trojan.Midori
New Malware.j McAfee Trojan.Proxy.458
New Malware.j McAfee Trojan.DownLoader.3152
New Malware.j McAfee BackDoor.Salle
New Malware.j McAfee Trojan.DownLoader.5372
New Malware.j McAfee Trojan.DownLoader.3899
New Malware.j McAfee Trojan.Click.649
New Malware.j McAfee Trojan.DownLoader.3909
New Malware.j McAfee Trojan.DownLoader.3835
New Malware.j McAfee Adware.SearchTwo
New Malware.j McAfee Trojan.DownLoader.3617
New Malware.j McAfee Trojan.Hot
New Malware.j McAfee Trojan.DownLoader.3295
New Malware.j McAfee Trojan.MulDrop.2080
New Malware.j McAfee Trojan.DownLoader.2729
New Malware.j McAfee Trojan.StartPage.91
New Malware.j McAfee Trojan.PWS.LDPinch.535
New Malware.j McAfee Trojan.DownLoader.793
New Malware.j McAfee Trojan.PWS.Banker.650
New Malware.j McAfee Trojan.Tofger.7000
New Malware.j McAfee BackDoor.Nuspy
New Malware.j McAfee BackDoor.IRC.Sdbot.243
New Malware.j McAfee BackDoor.IRC.Nazgul
New Malware.j McAfee Win32.HLLM.Breatle

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.