Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_Mlwr-13 aliases:

Name Vendor Dr.Web classification name
Possible_Mlwr-13 Trend Micro Trojan.NtRootKit.1722
Possible_Mlwr-13 Trend Micro Trojan.Spambot
Possible_Mlwr-13 Trend Micro Trojan.MulDrop.3137
Possible_Mlwr-13 Trend Micro BackDoor.Spymer
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.30163
Possible_Mlwr-13 Trend Micro Trojan.Packed.155
Possible_Mlwr-13 Trend Micro Trojan.Rootkit
Possible_Mlwr-13 Trend Micro Trojan.Hooker.180
Possible_Mlwr-13 Trend Micro Trojan.PWS.Qqpass.2065
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.6108
Possible_Mlwr-13 Trend Micro Trojan.Packed.158
Possible_Mlwr-13 Trend Micro Trojan.MulDrop.8214
Possible_Mlwr-13 Trend Micro Trojan.MulDrop.4787
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.48978
Possible_Mlwr-13 Trend Micro Trojan.Packed.162
Possible_Mlwr-13 Trend Micro BackDoor.Salidol
Possible_Mlwr-13 Trend Micro Trojan.Inject.5089
Possible_Mlwr-13 Trend Micro Trojan.Packed.494
Possible_Mlwr-13 Trend Micro Trojan.PWS.LDPinch.846
Possible_Mlwr-13 Trend Micro Trojan.Packed.153
Possible_Mlwr-13 Trend Micro Trojan.MulDrop.16397
Possible_Mlwr-13 Trend Micro Trojan.Cipher.67
Possible_Mlwr-13 Trend Micro Trojan.Ranky
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.59462
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.6086
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.46299
Possible_Mlwr-13 Trend Micro BackDoor.Psybot
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.15408
Possible_Mlwr-13 Trend Micro Trojan.Qoologic
Possible_Mlwr-13 Trend Micro Trojan.PWS.Legmir.268
Possible_Mlwr-13 Trend Micro Trojan.PWS.LDPinch.241
Possible_Mlwr-13 Trend Micro BackDoor.IRC.Sdbot.3193
Possible_Mlwr-13 Trend Micro Win32.HLLM.Reset
Possible_Mlwr-13 Trend Micro Win32.HLLW.DopeBot
Possible_Mlwr-13 Trend Micro Trojan.PWS.GoldSpy
Possible_Mlwr-13 Trend Micro Program.ServUServer.4103
Possible_Mlwr-13 Trend Micro BackDoor.Beizhu.970
Possible_Mlwr-13 Trend Micro BackDoor.IRC.Sdbot
Possible_Mlwr-13 Trend Micro BackDoor.Swz
Possible_Mlwr-13 Trend Micro BackDoor.Cia.28
Possible_Mlwr-13 Trend Micro Win32.HLLW.MyBot.based
Possible_Mlwr-13 Trend Micro Trojan.MulDrop.6267
Possible_Mlwr-13 Trend Micro Trojan.MulDrop.6020
Possible_Mlwr-13 Trend Micro BackDoor.Pigeon.5308
Possible_Mlwr-13 Trend Micro Trojan.Proxy.1824
Possible_Mlwr-13 Trend Micro Dialer.Telch
Possible_Mlwr-13 Trend Micro Trojan.Isbar.189
Possible_Mlwr-13 Trend Micro Trojan.DownLoader.14609
Possible_Mlwr-13 Trend Micro BackDoor.Pigeon.8305
Possible_Mlwr-13 Trend Micro Trojan.Inject.573

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.