Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Wantvi.I aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.17829
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.14564
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.1087
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.34069
Trojan:Win32/Wantvi.I Microsoft Trojan.Click.19754
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.596
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.505
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.4941
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.1071
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.458
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.580
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.568
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.612
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.10874
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.196
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.32618
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.140
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.35804
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.origin
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.4703
Trojan:Win32/Wantvi.I Microsoft Joke.Forgery.161
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.34613
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.32617
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.558
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.34586
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.439
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.33742
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.4949
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.1208
Trojan:Win32/Wantvi.I Microsoft Trojan.Shutdown.466
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.origin
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.683
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.33246
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.5013
Trojan:Win32/Wantvi.I Microsoft Trojan.PWS.Multi.45
Trojan:Win32/Wantvi.I Microsoft Trojan.Shutdown.555
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.5010
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.4973
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.5378
Trojan:Win32/Wantvi.I Microsoft Trojan.MulDrop.41178
Trojan:Win32/Wantvi.I Microsoft Trojan.Siggen.5676
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.2088
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.16481
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.13605
Trojan:Win32/Wantvi.I Microsoft Trojan.Siggen.22629
Trojan:Win32/Wantvi.I Microsoft Trojan.Siggen.26853
Trojan:Win32/Wantvi.I Microsoft Trojan.Fakealert.2082
Trojan:Win32/Wantvi.I Microsoft Trojan.Packed.4436
Trojan:Win32/Wantvi.I Microsoft Trojan.DownLoad.52134

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.