Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32 Shadow Service Install aliases:

Name Vendor Dr.Web classification name
Win32 Shadow Service Install VirusBlokAda FDOS.Asmcom
Win32 Shadow Service Install VirusBlokAda BackDoor.Zhen.9
Win32 Shadow Service Install VirusBlokAda Trojan.Sentinel
Win32 Shadow Service Install VirusBlokAda BackDoor.Beizhu.2245
Win32 Shadow Service Install VirusBlokAda Trojan.Spambot.3450
Win32 Shadow Service Install VirusBlokAda DDoS.Attack.origin
Win32 Shadow Service Install VirusBlokAda Trojan.Spambot.3541
Win32 Shadow Service Install VirusBlokAda Trojan.DownLoader.10995
Win32 Shadow Service Install VirusBlokAda Trojan.Swizzor.8649
Win32 Shadow Service Install VirusBlokAda Exploit.DCom.21
Win32 Shadow Service Install VirusBlokAda DDoS.Tenan
Win32 Shadow Service Install VirusBlokAda Trojan.Inservice
Win32 Shadow Service Install VirusBlokAda Trojan.MulDrop.15567
Win32 Shadow Service Install VirusBlokAda Program.Ardamax
Win32 Shadow Service Install VirusBlokAda BackDoor.IRC.Combot
Win32 Shadow Service Install VirusBlokAda BackDoor.Death.25
Win32 Shadow Service Install VirusBlokAda DDoS.Attack.13
Win32 Shadow Service Install VirusBlokAda Trojan.PWS.Legmir.162
Win32 Shadow Service Install VirusBlokAda Trojan.DownLoader.60861
Win32 Shadow Service Install VirusBlokAda Trojan.TermSpy
Win32 Shadow Service Install VirusBlokAda Trojan.StartPage.20156
Win32 Shadow Service Install VirusBlokAda BackDoor.Pigeon.463
Win32 Shadow Service Install VirusBlokAda Trojan.MulDrop.9474
Win32 Shadow Service Install VirusBlokAda Win32.HLLW.Zurenie
Win32 Shadow Service Install VirusBlokAda Win32.HLLM.Jubish
Win32 Shadow Service Install VirusBlokAda Trojan.Popclick
Win32 Shadow Service Install VirusBlokAda BackDoor.HackDef.50
Win32 Shadow Service Install VirusBlokAda Trojan.PWS.Capi
Win32 Shadow Service Install VirusBlokAda BackDoor.Himsi
Win32 Shadow Service Install VirusBlokAda DDoS.Bonke.50
Win32 Shadow Service Install VirusBlokAda BackDoor.Pigeon.457
Win32 Shadow Service Install VirusBlokAda BackDoor.IRC.Sdbot.827
Win32 Shadow Service Install VirusBlokAda BackDoor.IRC.Sdbot.820
Win32 Shadow Service Install VirusBlokAda BackDoor.Dosia
Win32 Shadow Service Install VirusBlokAda BackDoor.IRC.Communist
Win32 Shadow Service Install VirusBlokAda Trojan.PWS.Tanspy.718
Win32 Shadow Service Install VirusBlokAda Win32.HLLW.Autoruner.1891
Win32 Shadow Service Install VirusBlokAda Win32.HLLW.Autoruner.272
Win32 Shadow Service Install VirusBlokAda Win32.HLLO.Black
Win32 Shadow Service Install VirusBlokAda Trojan.Click.17734
Win32 Shadow Service Install VirusBlokAda Tool.Jamilah
Win32 Shadow Service Install VirusBlokAda Trojan.PWS.LDPinch.149
Win32 Shadow Service Install VirusBlokAda BackDoor.Beizhu.865
Win32 Shadow Service Install VirusBlokAda Trojan.DownLoader.49940
Win32 Shadow Service Install VirusBlokAda Trojan.Spambot.2830
Win32 Shadow Service Install VirusBlokAda Trojan.Packed.560
Win32 Shadow Service Install VirusBlokAda Trojan.Proxy.2339
Win32 Shadow Service Install VirusBlokAda Trojan.MulDrop.6415
Win32 Shadow Service Install VirusBlokAda Win32.HLLW.Lurker
Win32 Shadow Service Install VirusBlokAda Win32.HLLW.Sunday

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.