Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/RAHack aliases:

Name Vendor Dr.Web classification name
W32/RAHack McAfee Trojan.Starman.3282
W32/RAHack McAfee Trojan.Starman.3209
W32/RAHack McAfee Trojan.Starman.3206
W32/RAHack McAfee Trojan.Starman.3190
W32/RAHack McAfee Trojan.Starman.3220
W32/RAHack McAfee Trojan.Starman.3265
W32/RAHack McAfee Trojan.Starman.3257
W32/RAHack McAfee Trojan.Starman.3193
W32/RAHack McAfee Trojan.Starman.3250
W32/RAHack McAfee Trojan.Starman.3225
W32/RAHack McAfee Trojan.Starman.3200
W32/RAHack McAfee Trojan.Starman.3239
W32/RAHack McAfee Trojan.Starman.3155
W32/RAHack McAfee Trojan.Starman.3151
W32/RAHack McAfee Trojan.Starman.3237
W32/RAHack McAfee Trojan.Starman.3150
W32/RAHack McAfee Trojan.Starman.3157
W32/RAHack McAfee Trojan.Starman.3271
W32/RAHack McAfee Trojan.Starman.3277
W32/RAHack McAfee Trojan.Starman.3243
W32/RAHack McAfee Trojan.Starman.3216
W32/RAHack McAfee Trojan.Starman.3213
W32/RAHack McAfee Trojan.Starman.3215
W32/RAHack McAfee Trojan.Starman.3241
W32/RAHack McAfee Trojan.Starman.3233
W32/RAHack McAfee Trojan.Starman.3160
W32/RAHack McAfee Trojan.Starman.3222
W32/RAHack McAfee Trojan.Starman.3174
W32/RAHack McAfee Trojan.Starman.3181
W32/RAHack McAfee Trojan.Starman.3183
W32/RAHack McAfee Trojan.Starman.3173
W32/RAHack McAfee Trojan.Starman.3204
W32/RAHack McAfee Trojan.Starman.3219
W32/RAHack McAfee Trojan.Starman.3269
W32/RAHack McAfee Trojan.Starman.3202
W32/RAHack McAfee Trojan.Starman.3244
W32/RAHack McAfee Trojan.Starman.3192
W32/RAHack McAfee Trojan.Starman.3226
W32/RAHack McAfee Trojan.Starman.3266
W32/RAHack McAfee Trojan.Starman.3176
W32/RAHack McAfee Trojan.Starman.3166
W32/RAHack McAfee Trojan.Starman.3214
W32/RAHack McAfee Trojan.Starman.3281
W32/RAHack McAfee Trojan.Starman.3273
W32/RAHack McAfee Trojan.Starman.3198
W32/RAHack McAfee Trojan.Starman.3253
W32/RAHack McAfee Trojan.Starman.3152
W32/RAHack McAfee Trojan.Starman.3170
W32/RAHack McAfee Trojan.Starman.3259
W32/RAHack McAfee Trojan.Starman.3165

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.