Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/RAHack aliases:

Name Vendor Dr.Web classification name
W32/RAHack McAfee Trojan.Starman.3310
W32/RAHack McAfee Trojan.Starman.3309
W32/RAHack McAfee Trojan.Starman.3312
W32/RAHack McAfee Trojan.Starman.3311
W32/RAHack McAfee Trojan.Starman.3308
W32/RAHack McAfee Trojan.Starman.14
W32/RAHack McAfee Win32.HLLW.MyBot.3792
W32/RAHack McAfee Win32.HLLW.MyBot.4938
W32/RAHack McAfee Win32.HLLW.MyBot.4342
W32/RAHack McAfee Trojan.Starman.36
W32/RAHack McAfee Trojan.Starman.37
W32/RAHack McAfee Trojan.Starman.3287
W32/RAHack McAfee Trojan.Starman.3296
W32/RAHack McAfee Trojan.Starman.3295
W32/RAHack McAfee Trojan.Starman.3303
W32/RAHack McAfee Trojan.Starman.3304
W32/RAHack McAfee Trojan.Starman.3306
W32/RAHack McAfee Trojan.Starman.3302
W32/RAHack McAfee Trojan.Starman.3305
W32/RAHack McAfee Trojan.Starman.3301
W32/RAHack McAfee Trojan.Starman.3167
W32/RAHack McAfee Trojan.Starman.3185
W32/RAHack McAfee Trojan.Starman.3262
W32/RAHack McAfee Trojan.Starman.3256
W32/RAHack McAfee Trojan.Starman.3280
W32/RAHack McAfee Trojan.Starman.3163
W32/RAHack McAfee Trojan.Starman.3251
W32/RAHack McAfee Trojan.Starman.3276
W32/RAHack McAfee Trojan.Starman.3240
W32/RAHack McAfee Trojan.Starman.3255
W32/RAHack McAfee Trojan.Starman.3195
W32/RAHack McAfee Trojan.Starman.3260
W32/RAHack McAfee Trojan.Starman.3261
W32/RAHack McAfee Trojan.Starman.3263
W32/RAHack McAfee Trojan.Starman.3197
W32/RAHack McAfee Trojan.Starman.3189
W32/RAHack McAfee Trojan.Starman.3147
W32/RAHack McAfee Trojan.Starman.3268
W32/RAHack McAfee Trojan.Starman.3274
W32/RAHack McAfee Trojan.Starman.3168
W32/RAHack McAfee Trojan.Starman.3252
W32/RAHack McAfee Trojan.Starman.3169
W32/RAHack McAfee Trojan.Starman.3207
W32/RAHack McAfee Trojan.Starman.3231
W32/RAHack McAfee Trojan.Starman.3279
W32/RAHack McAfee Trojan.Starman.3178
W32/RAHack McAfee Trojan.Starman.3267
W32/RAHack McAfee Trojan.Starman.3164
W32/RAHack McAfee Trojan.Starman.3201
W32/RAHack McAfee Trojan.Starman.3254

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.