Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Virus:Win32/Detnat.F aliases:

Name Vendor Dr.Web classification name
Virus:Win32/Detnat.F Microsoft Trojan.DownLoader.9546
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Qqgame
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Qqrobber.90
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.215
Virus:Win32/Detnat.F Microsoft Trojan.Inject.89
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.12310
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.446
Virus:Win32/Detnat.F Microsoft Trojan.DownLoader.13879
Virus:Win32/Detnat.F Microsoft Win32.Besso
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.806
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Legmir.592
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.9774
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Qqrobber.158
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.5035
Virus:Win32/Detnat.F Microsoft Trojan.Vanti
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.9836
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Legmir.1310
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Wsgame
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.7892
Virus:Win32/Detnat.F Microsoft BackDoor.Pomax
Virus:Win32/Detnat.F Microsoft BackDoor.Rpcs
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Legmir.602
Virus:Win32/Detnat.F Microsoft Win32.HLLW.Autoruner.180
Virus:Win32/Detnat.F Microsoft Win32.HLLW.Autoruner
Virus:Win32/Detnat.F Microsoft Win32.HLLW.Autoruner.259
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Wow
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Vipgsm
Virus:Win32/Detnat.F Microsoft BackDoor.Graybird
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Kpo
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Bonque
Virus:Win32/Detnat.F Microsoft Trojan.KeyLogger.719
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Lineage.2855
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.744
Virus:Win32/Detnat.F Microsoft BackDoor.Graybird.2043
Virus:Win32/Detnat.F Microsoft Trojan.StartPage.1382
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.7249
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.612
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.9017
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.8028
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.805
Virus:Win32/Detnat.F Microsoft DownLoader.Generator
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.1273
Virus:Win32/Detnat.F Microsoft Trojan.Iauh
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Capay
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Legmir.600
Virus:Win32/Detnat.F Microsoft Trojan.PWS.Qqpass.1333
Virus:Win32/Detnat.F Microsoft Trojan.PWS.MagicPs.15
Virus:Win32/Detnat.F Microsoft BackDoor.IRC.Sdbot.1881
Virus:Win32/Detnat.F Microsoft BackDoor.Pigeon.6173
Virus:Win32/Detnat.F Microsoft Tool.Tsowa

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.