Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Ransom!p aliases:

Name Vendor Dr.Web classification name
Ransom!p McAfee Trojan.Fakealert.3987
Ransom!p McAfee Trojan.Fakealert.4096
Ransom!p McAfee Win32.Induc
Ransom!p McAfee Trojan.Blackmailer.1287
Ransom!p McAfee Trojan.Click.26017
Ransom!p McAfee Trojan.Winlock.69
Ransom!p McAfee Trojan.Blackmailer.762
Ransom!p McAfee Trojan.Winlock.146
Ransom!p McAfee Trojan.Winlock.124
Ransom!p McAfee Trojan.Winlock.63
Ransom!p McAfee Trojan.Winlock.179
Ransom!p McAfee Trojan.Blackmailer.1331
Ransom!p McAfee Trojan.Annoy.16
Ransom!p McAfee Trojan.PWS.Panda.114
Ransom!p McAfee Trojan.Winlock.150
Ransom!p McAfee Trojan.Winlock.214
Ransom!p McAfee Trojan.Winlock.39
Ransom!p McAfee Trojan.Winlock.105
Ransom!p McAfee Trojan.Blackmailer.1086
Ransom!p McAfee Trojan.MulDrop.32703
Ransom!p McAfee Trojan.Winlock.24
Ransom!p McAfee Trojan.Blackmailer.1280
Ransom!p McAfee Trojan.Winlock.68
Ransom!p McAfee Trojan.Inject.549
Ransom!p McAfee Trojan.Blackmailer.1338
Ransom!p McAfee Trojan.Winlock.55
Ransom!p McAfee Trojan.Annoy.20
Ransom!p McAfee Trojan.Fakealert.4087
Ransom!p McAfee Trojan.Winlock.27
Ransom!p McAfee Trojan.Blackmailer.814
Ransom!p McAfee Trojan.Blackmailer.866
Ransom!p McAfee Trojan.Blackmailer.1036
Ransom!p McAfee Trojan.Starter.1003
Ransom!p McAfee Trojan.Blackmailer.876
Ransom!p McAfee Trojan.MulDrop.30762
Ransom!p McAfee Trojan.Winlock.origin
Ransom!p McAfee Trojan.Blackmailer.813
Ransom!p McAfee Trojan.Blackmailer.812
Ransom!p McAfee Trojan.Blackmailer.1516
Ransom!p McAfee Trojan.Winlock.365
Ransom!p McAfee Trojan.Fakealert.6382
Ransom!p McAfee Trojan.Fakealert.7350

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.