Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus aliases:

Name Vendor Dr.Web classification name
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.13544
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Zhengtu
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Wow
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Lineage
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Pigeon.510
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Win32.HLLW.Goffue
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Win32.HLLW.MyBot
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Fport
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Win32.IRC.Bot
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Adware.Cdn
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14228
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Qqpass.252
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Aihu
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.Admod
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14403
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Pigeon.569
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.Click.1621
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot FDOS.MailBomber
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.Winpop
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14526
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Pigeon.592
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14689
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.LDPinch.113
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14691
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14663
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Qqshou
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.IRC.Sdbot.899
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14792
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Huai
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Psyrat
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14888
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.Click.1684
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14984
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot DDoS.Chunked
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Klj
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Banker.5761
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.15141
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Qqrobber.170
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.14036
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.15392
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.15288
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.15276
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.15305
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.15449
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.DownLoader.15452
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Adware.Baidu
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Gamania
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot BackDoor.Pigeon.516
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Trojan.PWS.Legmir.725
Possibly a new variant of W32/Threat-HLLIN-Slipper-based!Maximus F-Prot Win32.HLLW.Gavir.61

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.