Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Fujacks aliases:

Name Vendor Dr.Web classification name
W32/Fujacks McAfee Trojan.DownLoader.14855
W32/Fujacks McAfee Trojan.DownLoader.15706
W32/Fujacks McAfee Win32.HLLP.Whboy
W32/Fujacks McAfee Win32.HLLW.Wuhan
W32/Fujacks McAfee Trojan.DownLoader.17558
W32/Fujacks McAfee Win32.HLLW.Whboy
W32/Fujacks McAfee Win32.HLLP.Whboy.15
W32/Fujacks McAfee Win32.HLLP.Tongji
W32/Fujacks McAfee Trojan.Starter.85
W32/Fujacks McAfee Trojan.PWS.Gamania
W32/Fujacks McAfee Trojan.MulDrop.6279
W32/Fujacks McAfee BackDoor.Pigeon.1604
W32/Fujacks McAfee Win32.HLLW.Autoruner
W32/Fujacks McAfee Trojan.MulDrop.6314
W32/Fujacks McAfee Win32.HLLP.Whboy.33
W32/Fujacks McAfee Win32.HLLP.Whboy.91
W32/Fujacks McAfee Trojan.Starter.174
W32/Fujacks McAfee Trojan.Rox
W32/Fujacks McAfee Win32.HLLP.Whboy.90
W32/Fujacks McAfee Trojan.KillMe
W32/Fujacks McAfee Trojan.Arpspoof
W32/Fujacks McAfee Win32.HLLW.Autoruner.1591
W32/Fujacks McAfee Trojan.Hunder
W32/Fujacks McAfee Win32.HLLW.Autoruner.834
W32/Fujacks McAfee Trojan.Linker
W32/Fujacks McAfee Trojan.HideProc
W32/Fujacks McAfee Trojan.DownLoader.37827
W32/Fujacks McAfee Trojan.MulDrop.6085
W32/Fujacks McAfee Win32.HLLP.Whboy.93
W32/Fujacks McAfee Win32.HLLP.Whboy.70
W32/Fujacks McAfee Win32.HLLP.Whboy.79
W32/Fujacks McAfee Win32.HLLP.Whboy.74
W32/Fujacks McAfee Win32.HLLP.Whboy.82
W32/Fujacks McAfee Win32.HLLP.Whboy.35
W32/Fujacks McAfee Win32.HLLP.Whboy.78
W32/Fujacks McAfee Win32.HLLP.Whboy.71
W32/Fujacks McAfee Trojan.Dapat
W32/Fujacks McAfee Win32.HLLP.Whboy.36
W32/Fujacks McAfee Win32.HLLP.Whboy.28
W32/Fujacks McAfee Win32.HLLP.Whboy.84
W32/Fujacks McAfee Win32.HLLP.Whboy.85
W32/Fujacks McAfee Trojan.DownLoader.10963
W32/Fujacks McAfee Win32.HLLP.Whboy.34
W32/Fujacks McAfee Win32.HLLP.Whboy.18
W32/Fujacks McAfee Trojan.Proxy.2796
W32/Fujacks McAfee Trojan.DownLoader.20355
W32/Fujacks McAfee Trojan.MulDrop.10210
W32/Fujacks McAfee Trojan.DownLoader.33317
W32/Fujacks McAfee Trojan.DownLoader.19095
W32/Fujacks McAfee Win32.HLLP.Whboy.75

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.