Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possibly a new variant of W32/Threat-HLLIN-based!Maximus aliases:

Name Vendor Dr.Web classification name
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Qqrobber.98
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.MulDrop.3399
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.DownLoader.10647
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Qqshou
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.299
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Win32.HLLW.SpyBot
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.348
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.LDPinch.995
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.343
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.354
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.347
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Poptang
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.LDPinch.1047
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Qqpass.98
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.128
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Banker.2779
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.375
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.267
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.380
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Gserv
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Wow
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.386
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Win32.IRC.Bot
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Legmir.542
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.402
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.398
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.194
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.420
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Gamania
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.421
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Graybird
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.342
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.DownLoader.12562
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.481
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Beizhu
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.532
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.502
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Mailbot
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Win32.HLLW.MyBot
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.561
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.436
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.579
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.580
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.XFlash
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.Peflog.53
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.622
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.660
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot Trojan.PWS.Slaped
Possibly a new variant of W32/Threat-HLLIN-based!Maximus F-Prot BackDoor.Pigeon.423

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.