Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_MLWR-24 aliases:

Name Vendor Dr.Web classification name
Possible_MLWR-24 Trend Micro BackDoor.Generic.1391
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4628
Possible_MLWR-24 Trend Micro BackDoor.HackDef.393
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4453
Possible_MLWR-24 Trend Micro Trojan.MulDrop.7498
Possible_MLWR-24 Trend Micro Trojan.DownLoader.27155
Possible_MLWR-24 Trend Micro Trojan.DownLoader.17504
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.5035
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.5034
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4041
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.1261
Possible_MLWR-24 Trend Micro Trojan.PWS.Legmir.1136
Possible_MLWR-24 Trend Micro Trojan.Proxy.1534
Possible_MLWR-24 Trend Micro BackDoor.Nisb
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4790
Possible_MLWR-24 Trend Micro Trojan.PWS.Gamania.2535
Possible_MLWR-24 Trend Micro Trojan.DownLoader.26644
Possible_MLWR-24 Trend Micro Trojan.DownLoader.48978
Possible_MLWR-24 Trend Micro BackDoor.IRC.Cbot
Possible_MLWR-24 Trend Micro Trojan.Proxy.1652
Possible_MLWR-24 Trend Micro Trojan.Proxy.1661
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.1247
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.11870
Possible_MLWR-24 Trend Micro BackDoor.BlackHole.2038
Possible_MLWR-24 Trend Micro Trojan.DownLoader.27484
Possible_MLWR-24 Trend Micro BackDoor.Serpent
Possible_MLWR-24 Trend Micro Trojan.DownLoader.26665
Possible_MLWR-24 Trend Micro Trojan.PWS.Kpo
Possible_MLWR-24 Trend Micro Trojan.MulDrop.7510
Possible_MLWR-24 Trend Micro Trojan.PWS.Wool
Possible_MLWR-24 Trend Micro Trojan.PWS.Legmir.1165
Possible_MLWR-24 Trend Micro Trojan.PWS.Legmir.1168
Possible_MLWR-24 Trend Micro Adware.Cdn
Possible_MLWR-24 Trend Micro BackDoor.Binghe
Possible_MLWR-24 Trend Micro Trojan.DownLoader.28433
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4976
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4600
Possible_MLWR-24 Trend Micro BackDoor.Generic.1476
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4761
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4718
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4967
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.1252
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.4984
Possible_MLWR-24 Trend Micro Trojan.MulDrop.5961
Possible_MLWR-24 Trend Micro DownLoader.Generator
Possible_MLWR-24 Trend Micro Trojan.StartPage.1864
Possible_MLWR-24 Trend Micro BackDoor.Pigeon.1599
Possible_MLWR-24 Trend Micro Trojan.PWS.Legmir.1173
Possible_MLWR-24 Trend Micro Tool.PaPinch
Possible_MLWR-24 Trend Micro Program.RemoteAdmin.43

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.