Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/RAHack aliases:

Name Vendor Dr.Web classification name
W32/RAHack McAfee Trojan.Starman.342
W32/RAHack McAfee Trojan.Starman.446
W32/RAHack McAfee Trojan.Starman.326
W32/RAHack McAfee Trojan.Starman.1327
W32/RAHack McAfee Trojan.Starman.412
W32/RAHack McAfee Trojan.Starman.444
W32/RAHack McAfee Trojan.Starman.389
W32/RAHack McAfee Trojan.Starman.447
W32/RAHack McAfee Trojan.Starman.340
W32/RAHack McAfee Trojan.Starman.348
W32/RAHack McAfee Trojan.Starman.317
W32/RAHack McAfee Trojan.Starman.445
W32/RAHack McAfee Trojan.Starman.333
W32/RAHack McAfee Trojan.Starman.411
W32/RAHack McAfee Trojan.Starman.424
W32/RAHack McAfee Trojan.Starman.370
W32/RAHack McAfee Trojan.Starman.354
W32/RAHack McAfee Trojan.Starman.404
W32/RAHack McAfee Trojan.Starman.419
W32/RAHack McAfee Trojan.Starman.409
W32/RAHack McAfee Trojan.Starman.374
W32/RAHack McAfee Trojan.Starman.360
W32/RAHack McAfee Trojan.Starman.399
W32/RAHack McAfee Trojan.Starman.426
W32/RAHack McAfee Trojan.Starman.3898
W32/RAHack McAfee Trojan.Starman.349
W32/RAHack McAfee Trojan.Starman.422
W32/RAHack McAfee Trojan.Starman.321
W32/RAHack McAfee Trojan.Starman.435
W32/RAHack McAfee Trojan.Starman.381
W32/RAHack McAfee Trojan.Starman.366
W32/RAHack McAfee Trojan.Starman.353
W32/RAHack McAfee Trojan.Starman.443
W32/RAHack McAfee Trojan.Starman.80
W32/RAHack McAfee Trojan.Starman.3887
W32/RAHack McAfee Trojan.Starman.327
W32/RAHack McAfee Trojan.Starman.425
W32/RAHack McAfee Trojan.Starman.454
W32/RAHack McAfee Trojan.Starman.323
W32/RAHack McAfee Trojan.Starman.386
W32/RAHack McAfee Trojan.Starman.402
W32/RAHack McAfee Trojan.Starman.396
W32/RAHack McAfee Trojan.Starman.318
W32/RAHack McAfee Trojan.Starman.74
W32/RAHack McAfee Trojan.Starman.383
W32/RAHack McAfee Trojan.Starman.455
W32/RAHack McAfee Trojan.Starman.448
W32/RAHack McAfee Trojan.Starman.437
W32/RAHack McAfee Trojan.Starman.408
W32/RAHack McAfee Trojan.Starman.345

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.