FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Checkout aliases:

Name Vendor Dr.Web classification name
W32/Checkout McAfee BackDoor.IRC.Sdbot.1703
W32/Checkout McAfee Trojan.MulDrop.8316
W32/Checkout McAfee BackDoor.IRC.Sdbot.1987
W32/Checkout McAfee BackDoor.Pigeon.7223
W32/Checkout McAfee Win32.HLLW.Sodoku
W32/Checkout McAfee BackDoor.IRC.Sdbot.1958
W32/Checkout McAfee Trojan.Inject.440
W32/Checkout McAfee BackDoor.IRC.Sdbot.2504
W32/Checkout McAfee BackDoor.IRC.Sdbot.2240
W32/Checkout McAfee BackDoor.IRC.Sdbot.2234
W32/Checkout McAfee Trojan.Wrong
W32/Checkout McAfee BackDoor.IRC.Shabot
W32/Checkout McAfee Trojan.Inject.726
W32/Checkout McAfee BackDoor.IRC.Suicide.22
W32/Checkout McAfee BackDoor.IRC.Sdbot.2242
W32/Checkout McAfee BackDoor.IRC.Sdbot.1964
W32/Checkout McAfee Trojan.MulDrop.8317
W32/Checkout McAfee BackDoor.IRC.Sdbot.2066
W32/Checkout McAfee BackDoor.IRC.Sdbot.2286
W32/Checkout McAfee BackDoor.IRC.Sdbot.3391
W32/Checkout McAfee BackDoor.IRC.Sdbot.2241
W32/Checkout McAfee Win32.HLLW.Crazy
W32/Checkout McAfee BackDoor.IRC.Sdbot.2226
W32/Checkout McAfee Trojan.MulDrop.8079
W32/Checkout McAfee Trojan.MulDrop.9014
W32/Checkout McAfee Trojan.Inject.372
W32/Checkout McAfee Trojan.Inject.409
W32/Checkout McAfee Trojan.Inject.400
W32/Checkout McAfee BackDoor.Pigeon.6655
W32/Checkout McAfee BackDoor.Tiny
W32/Checkout McAfee BackDoor.IRC.Sdbot.1933
W32/Checkout McAfee Trojan.MulDrop.23740
W32/Checkout McAfee BackDoor.IRC.Sdbot.1963
W32/Checkout McAfee BackDoor.IRC.Sdbot.2136
W32/Checkout McAfee BackDoor.IRC.Sdbot.2236
W32/Checkout McAfee Trojan.Packed.162
W32/Checkout McAfee BackDoor.IRC.Sdbot.4590
W32/Checkout McAfee Trojan.Siggen.2120
W32/Checkout McAfee BackDoor.IRC.Unkbot.19
W32/Checkout McAfee BackDoor.IRC.Sdbot
W32/Checkout McAfee Win32.HLLW.Autoruner.3879
W32/Checkout McAfee BackDoor.Bifrost.740
W32/Checkout McAfee Win32.HLLW.Autoruner.6328
W32/Checkout McAfee Trojan.Siggen.2175
W32/Checkout McAfee BackDoor.IRC.Sdbot.4754
W32/Checkout McAfee BackDoor.IRC.Sdbot.3762
W32/Checkout McAfee BackDoor.IRC.Suicide
W32/Checkout McAfee BackDoor.IRC.Sdbot.2285
W32/Checkout McAfee Trojan.MulDrop.8346
W32/Checkout McAfee BackDoor.IRC.Simplbot

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

Dr.Web © Doctor Web
2003 — 2022

Doctor Web is a Russian cybersecurity company focused on threat detection, prevention and response technologies.