Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/RAHack aliases:

Name Vendor Dr.Web classification name
W32/RAHack McAfee Trojan.Starman.283
W32/RAHack McAfee Trojan.Starman.263
W32/RAHack McAfee Trojan.Starman.423
W32/RAHack McAfee Trojan.Starman.393
W32/RAHack McAfee Trojan.Starman.1207
W32/RAHack McAfee Trojan.Starman.378
W32/RAHack McAfee Trojan.Starman.356
W32/RAHack McAfee Trojan.Starman.268
W32/RAHack McAfee Trojan.Starman.265
W32/RAHack McAfee Trojan.Starman.315
W32/RAHack McAfee Trojan.Starman.1237
W32/RAHack McAfee Trojan.Starman.413
W32/RAHack McAfee Trojan.Starman.406
W32/RAHack McAfee Trojan.Starman.372
W32/RAHack McAfee Trojan.Starman.341
W32/RAHack McAfee Trojan.Starman.397
W32/RAHack McAfee Trojan.Starman.344
W32/RAHack McAfee Trojan.Starman.434
W32/RAHack McAfee Trojan.Starman.384
W32/RAHack McAfee Trojan.Starman.369
W32/RAHack McAfee Trojan.Starman.440
W32/RAHack McAfee Trojan.Starman.292
W32/RAHack McAfee Trojan.Starman.291
W32/RAHack McAfee Trojan.Starman.253
W32/RAHack McAfee Trojan.Starman.431
W32/RAHack McAfee Trojan.Starman.375
W32/RAHack McAfee Trojan.Starman.367
W32/RAHack McAfee Trojan.Starman.450
W32/RAHack McAfee Trojan.Starman.295
W32/RAHack McAfee Trojan.Starman.229
W32/RAHack McAfee Trojan.Starman.1369
W32/RAHack McAfee Trojan.Starman.239
W32/RAHack McAfee Trojan.Starman.69
W32/RAHack McAfee Trojan.Starman.238
W32/RAHack McAfee Trojan.Starman.357
W32/RAHack McAfee Trojan.Starman.285
W32/RAHack McAfee Trojan.Starman.1364
W32/RAHack McAfee Trojan.Starman.1183
W32/RAHack McAfee Trojan.Starman.407
W32/RAHack McAfee Trojan.Starman.352
W32/RAHack McAfee Trojan.Starman.368
W32/RAHack McAfee Trojan.Starman.432
W32/RAHack McAfee Trojan.Starman.392
W32/RAHack McAfee Trojan.Starman.428
W32/RAHack McAfee Trojan.Starman.3999
W32/RAHack McAfee Trojan.Starman.346
W32/RAHack McAfee Trojan.Starman.380
W32/RAHack McAfee Trojan.Starman.324
W32/RAHack McAfee Trojan.Starman.449
W32/RAHack McAfee Trojan.Starman.77

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.