Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Win32.g2 aliases:

Name Vendor Dr.Web classification name
New Win32.g2 McAfee Trojan.PWS.Legmir.333
New Win32.g2 McAfee BackDoor.Emule.42
New Win32.g2 McAfee Win32.IRC.Bot.based
New Win32.g2 McAfee Win32.Facha
New Win32.g2 McAfee Win32.HLLW.MyBot
New Win32.g2 McAfee Win32.HLLW.MyBot.based
New Win32.g2 McAfee Win32.HLLW.Warm.1
New Win32.g2 McAfee Trojan.MulDrop.2929
New Win32.g2 McAfee Trojan.MulDrop.1466
New Win32.g2 McAfee Trojan.MulDrop.877
New Win32.g2 McAfee BackDoor.PSClient
New Win32.g2 McAfee Trojan.DownLoader.7382
New Win32.g2 McAfee Trojan.PWS.LDPinch.822
New Win32.g2 McAfee Trojan.PWS.QQGhost
New Win32.g2 McAfee Trojan.DownLoader.10181
New Win32.g2 McAfee Trojan.DownLoader.10475
New Win32.g2 McAfee Win32.HLLW.Tpx
New Win32.g2 McAfee DownLoader.Generator
New Win32.g2 McAfee Trojan.Inject.125
New Win32.g2 McAfee BackDoor.Pigeon.398
New Win32.g2 McAfee Tool.ASEye.2
New Win32.g2 McAfee Trojan.PWS.GoldSpy
New Win32.g2 McAfee Trojan.DownLoader.13288
New Win32.g2 McAfee Trojan.DownLoader.13315
New Win32.g2 McAfee Trojan.MulDrop.3030
New Win32.g2 McAfee Trojan.MulDrop.5406
New Win32.g2 McAfee Trojan.MulDrop.5800
New Win32.g2 McAfee Trojan.PWS.Wsgame
New Win32.g2 McAfee Trojan.MulDrop.5946
New Win32.g2 McAfee Trojan.PWS.LDPinch.1646
New Win32.g2 McAfee Win32.HLLM.Beagle.45089
New Win32.g2 McAfee Win32.Bellrus
New Win32.g2 McAfee Trojan.PWS.LDPinch.1742
New Win32.g2 McAfee BackDoor.Izhte
New Win32.g2 McAfee Trojan.DownLoader.51070
New Win32.g2 McAfee Trojan.StartPage.21154
New Win32.g2 McAfee Trojan.PWS.LDPinch.3274
New Win32.g2 McAfee BackDoor.IRC.Drefer
New Win32.g2 McAfee Trojan.Packed.153
New Win32.g2 McAfee Trojan.Dout.362
New Win32.g2 McAfee Trojan.Dout.356
New Win32.g2 McAfee Trojan.Dout.358
New Win32.g2 McAfee Trojan.KeyLogger.2331
New Win32.g2 McAfee BackDoor.Inge
New Win32.g2 McAfee Trojan.Inject.3631
New Win32.g2 McAfee Trojan.Dout.185
New Win32.g2 McAfee Trojan.MulDrop.9951
New Win32.g2 McAfee Trojan.MulDrop.16888
New Win32.g2 McAfee BackDoor.IRC.Sdbot.2190
New Win32.g2 McAfee Trojan.DownLoad.788

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.