Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/RAHack aliases:

Name Vendor Dr.Web classification name
W32/RAHack McAfee Trojan.Starman.248
W32/RAHack McAfee Trojan.Starman.293
W32/RAHack McAfee Trojan.Starman.233
W32/RAHack McAfee Trojan.Starman.223
W32/RAHack McAfee Trojan.Starman.254
W32/RAHack McAfee Trojan.Starman.3949
W32/RAHack McAfee Trojan.Starman.267
W32/RAHack McAfee Trojan.Starman.311
W32/RAHack McAfee Trojan.Starman.304
W32/RAHack McAfee Trojan.Starman.240
W32/RAHack McAfee Trojan.Starman.232
W32/RAHack McAfee Trojan.Starman.228
W32/RAHack McAfee Trojan.Starman.279
W32/RAHack McAfee Trojan.Starman.264
W32/RAHack McAfee Trojan.Starman.261
W32/RAHack McAfee Trojan.Starman.302
W32/RAHack McAfee Trojan.Starman.269
W32/RAHack McAfee Trojan.Starman.221
W32/RAHack McAfee Trojan.Starman.313
W32/RAHack McAfee Trojan.Starman.217
W32/RAHack McAfee Trojan.Starman.257
W32/RAHack McAfee Trojan.Starman.303
W32/RAHack McAfee Trojan.Starman.312
W32/RAHack McAfee Trojan.Starman.252
W32/RAHack McAfee Trojan.Starman.3987
W32/RAHack McAfee Trojan.Starman.249
W32/RAHack McAfee Trojan.Starman.314
W32/RAHack McAfee Trojan.Starman.307
W32/RAHack McAfee Trojan.Starman.274
W32/RAHack McAfee Trojan.Starman.220
W32/RAHack McAfee Trojan.Starman.246
W32/RAHack McAfee Trojan.Starman.237
W32/RAHack McAfee Trojan.Starman.3977
W32/RAHack McAfee Trojan.Starman.287
W32/RAHack McAfee Trojan.Starman.284
W32/RAHack McAfee Trojan.Starman.241
W32/RAHack McAfee Trojan.Starman.276
W32/RAHack McAfee Trojan.Starman.224
W32/RAHack McAfee Trojan.Starman.1170
W32/RAHack McAfee Trojan.Starman.299
W32/RAHack McAfee Trojan.Starman.266
W32/RAHack McAfee Trojan.Starman.296
W32/RAHack McAfee Trojan.Starman.306
W32/RAHack McAfee Trojan.Starman.258
W32/RAHack McAfee Trojan.Starman.395
W32/RAHack McAfee Trojan.Starman.301
W32/RAHack McAfee Trojan.Starman.1331
W32/RAHack McAfee Trojan.Starman.286
W32/RAHack McAfee Trojan.Starman.3903
W32/RAHack McAfee Trojan.Starman.262

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.