Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_Mlwr-15 aliases:

Name Vendor Dr.Web classification name
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.11604
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.2346
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.11926
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.7281
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.24002
Possible_Mlwr-15 Trend Micro BackDoor.Beizhu
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.1209
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.3990
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.647
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.1933
Possible_Mlwr-15 Trend Micro Trojan.MulDrop.11516
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.26844
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.669
Possible_Mlwr-15 Trend Micro BackDoor.Beizhu.272
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.2072
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.9972
Possible_Mlwr-15 Trend Micro BackDoor.Huai.1987
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.12354
Possible_Mlwr-15 Trend Micro BackDoor.BlackHole.2013
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.23173
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.194
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.13487
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.303
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.9045
Possible_Mlwr-15 Trend Micro Trojan.PWS.Legmir.600
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.11901
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.9244
Possible_Mlwr-15 Trend Micro BackDoor.IRC.Sdbot.1881
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.2194
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.2570
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.8949
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.1823
Possible_Mlwr-15 Trend Micro Trojan.MulDrop.12363
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.50524
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.58125
Possible_Mlwr-15 Trend Micro BackDoor.BlackHole.2096
Possible_Mlwr-15 Trend Micro Trojan.DownLoader.48978
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.8459
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.8484
Possible_Mlwr-15 Trend Micro Trojan.MulDrop.9609
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.8447
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.8386
Possible_Mlwr-15 Trend Micro BackDoor.Pigeon.8429
Possible_Mlwr-15 Trend Micro Trojan.MulDrop.9617
Possible_Mlwr-15 Trend Micro BackDoor.Huai.821
Possible_Mlwr-15 Trend Micro Trojan.MulDrop.9618
Possible_Mlwr-15 Trend Micro BackDoor.Huai.761
Possible_Mlwr-15 Trend Micro BackDoor.IRC.Sdbot.2110
Possible_Mlwr-15 Trend Micro Trojan.MulDrop.9592
Possible_Mlwr-15 Trend Micro Trojan.PWS.Legmir.812

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.