Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Fujacks aliases:

Name Vendor Dr.Web classification name
Win32/Fujacks AVG Trojan.DownLoader.42350
Win32/Fujacks AVG Win32.HLLP.Whboy.22
Win32/Fujacks Microsoft Win32.HLLP.Whboy
Win32/Fujacks AVG Win32.HLLP.Whboy.90
Win32/Fujacks AVG Win32.HLLP.Whboy.80
Win32/Fujacks AVG Win32.HLLP.Whboy.35
Win32/Fujacks AVG Win32.HLLP.Whboy
Win32/Fujacks AVG Win32.HLLP.Whboy.78
Win32/Fujacks AVG Win32.HLLP.Whboy.71
Win32/Fujacks AVG Win32.HLLP.Whboy.21
Win32/Fujacks AVG Win32.HLLP.Whboy.36
Win32/Fujacks AVG Win32.HLLP.Whboy.84
Win32/Fujacks AVG Win32.HLLP.Whboy.85
Win32/Fujacks AVG Trojan.Proxy.2796
Win32/Fujacks AVG Win32.HLLP.Whboy.55
Win32/Fujacks AVG Win32.HLLP.Whboy.37
Win32/Fujacks AVG Trojan.DownLoader.44659
Win32/Fujacks AVG Trojan.DownLoader.15706
Win32/Fujacks AVG Win32.HLLP.Whboy.20
Win32/Fujacks AVG BackDoor.Beizhu.903
Win32/Fujacks AVG Trojan.WSLogger
Win32/Fujacks AVG Win32.HLLW.Texmer.48
Win32/Fujacks AVG Trojan.DownLoader.43602
Win32/Fujacks AVG Trojan.DownLoader.44739
Win32/Fujacks AVG Win32.HLLP.Whboy.51
Win32/Fujacks AVG Win32.HLLP.Whboy.68
Win32/Fujacks AVG Win32.HLLP.Whboy.75
Win32/Fujacks AVG BackDoor.Ddoser
Win32/Fujacks AVG Win32.HLLP.Whboy.87
Win32/Fujacks AVG Trojan.DownLoader.19126
Win32/Fujacks AVG Trojan.Starter.85
Win32/Fujacks AVG Win32.HLLW.Autoruner.4261
Win32/Fujacks AVG Win32.HLLW.Autoruner.6386
Win32/Fujacks AVG Win32.HLLW.Texmer
Win32/Fujacks AVG Win32.HLLW.Autohit.3438
Win32/Fujacks AVG Trojan.DownLoader.43576
Win32/Fujacks AVG BackDoor.Pigeon.13257
Win32/Fujacks AVG Trojan.PWS.Ola.60
Win32/Fujacks AVG Win32.HLLP.Whboy.109
Win32/Fujacks AVG BackDoor.Pigeon.11728
Win32/Fujacks AVG BackDoor.Pigeon.24590
Win32/Fujacks AVG BackDoor.Pigeon.8356
Win32/Fujacks AVG Trojan.MulDrop.32998
Win32/Fujacks AVG Trojan.DownLoader.36816
Win32/Fujacks AVG BackDoor.Pigeon.5314
Win32/Fujacks AVG Trojan.DownLoader.43410
Win32/Fujacks AVG Trojan.DownLoader.62364
Win32/Fujacks AVG Win32.HLLW.Autoruner.3438
Win32/Fujacks AVG Trojan.DownLoader.43564
Win32/Fujacks AVG BackDoor.Huai.4744

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.