Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/RAHack aliases:

Name Vendor Dr.Web classification name
W32/RAHack McAfee Trojan.Starman.247
W32/RAHack McAfee Trojan.Starman.1177
W32/RAHack McAfee Trojan.Starman.222
W32/RAHack McAfee Trojan.Starman.297
W32/RAHack McAfee Trojan.Starman.256
W32/RAHack McAfee Trojan.Starman.242
W32/RAHack McAfee Trojan.Starman.298
W32/RAHack McAfee Trojan.Starman.68
W32/RAHack McAfee Trojan.Starman.250
W32/RAHack McAfee Trojan.Starman.290
W32/RAHack McAfee Trojan.Starman.251
W32/RAHack McAfee Trojan.Starman.300
W32/RAHack McAfee Trojan.Starman.255
W32/RAHack McAfee Trojan.Starman.230
W32/RAHack McAfee Trojan.Starman.225
W32/RAHack McAfee Trojan.Starman.245
W32/RAHack McAfee Trojan.Starman.227
W32/RAHack McAfee Trojan.Starman.243
W32/RAHack McAfee Trojan.Starman.275
W32/RAHack McAfee Trojan.Starman.271
W32/RAHack McAfee Trojan.Starman.270
W32/RAHack McAfee Trojan.Starman.234
W32/RAHack McAfee Trojan.Starman.72
W32/RAHack McAfee Trojan.Starman.273
W32/RAHack McAfee Trojan.Starman.272
W32/RAHack McAfee Trojan.Starman.3988
W32/RAHack McAfee Trojan.Starman.3984
W32/RAHack McAfee Trojan.Starman.308
W32/RAHack McAfee Trojan.Starman.1100
W32/RAHack McAfee Trojan.Starman.244
W32/RAHack McAfee Trojan.Starman.280
W32/RAHack McAfee Trojan.Starman.235
W32/RAHack McAfee Trojan.Starman.281
W32/RAHack McAfee Trojan.Starman.231
W32/RAHack McAfee Trojan.Starman.294
W32/RAHack McAfee Trojan.Starman.278
W32/RAHack McAfee Trojan.Starman.219
W32/RAHack McAfee Trojan.Starman.289
W32/RAHack McAfee Trojan.Starman.288
W32/RAHack McAfee Trojan.Starman.78
W32/RAHack McAfee Trojan.Starman.433
W32/RAHack McAfee Trojan.Starman.403
W32/RAHack McAfee Trojan.Starman.438
W32/RAHack McAfee Trojan.Starman.1398
W32/RAHack McAfee Trojan.Starman.339
W32/RAHack McAfee Trojan.Starman.459
W32/RAHack McAfee Trojan.Starman.328
W32/RAHack McAfee Trojan.Starman.71
W32/RAHack McAfee Trojan.Starman.259
W32/RAHack McAfee Trojan.Starman.218

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.