Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Detnat.F aliases:

Name Vendor Dr.Web classification name
Win32/Detnat.F Microsoft Trojan.Parmor
Win32/Detnat.F Microsoft Trojan.Click.4291
Win32/Detnat.F Microsoft Trojan.PWS.Legmir.592
Win32/Detnat.F Microsoft Trojan.PWS.Mifeng
Win32/Detnat.F Microsoft Trojan.MulDrop.4894
Win32/Detnat.F Microsoft Trojan.DownLoader.13348
Win32/Detnat.F Microsoft Trojan.DownLoader.13897
Win32/Detnat.F Microsoft Trojan.DownLoader.12294
Win32/Detnat.F Microsoft BackDoor.Generic.1468
Win32/Detnat.F Microsoft Win32.HLLW.Gavir.52
Win32/Detnat.F Microsoft BackDoor.Pigeon.1273
Win32/Detnat.F Microsoft BackDoor.Wowish
Win32/Detnat.F Microsoft Trojan.DownLoader.15237
Win32/Detnat.F Microsoft Trojan.DownLoader.13879
Win32/Detnat.F Microsoft Trojan.PWS.Bonque
Win32/Detnat.F Microsoft Trojan.StartPage.1382
Win32/Detnat.F Microsoft Trojan.PWS.Legmir.898
Win32/Detnat.F Microsoft Trojan.MulDrop.4999
Win32/Detnat.F Microsoft Win32.Besso
Win32/Detnat.F Microsoft BackDoor.Pigeon.9037
Win32/Detnat.F Microsoft BackDoor.Pigeon.38
Win32/Detnat.F Microsoft Trojan.PWS.Capay
Win32/Detnat.F Microsoft Trojan.PWS.Qqgame
Win32/Detnat.F Microsoft Trojan.PWS.Qqpass.1333
Win32/Detnat.F Microsoft Trojan.PWS.Legmir.600
Win32/Detnat.F Microsoft Trojan.PWS.MagicPs.15
Win32/Detnat.F Microsoft Trojan.MulDrop.3802
Win32/Detnat.F Microsoft Trojan.PWS.Legmir.1310
Win32/Detnat.F Microsoft Trojan.PWS.Spywoool
Win32/Detnat.F Microsoft Trojan.DownLoader.3139
Win32/Detnat.F Microsoft BackDoor.Pigeon.592
Win32/Detnat.F Microsoft BackDoor.Pigeon.1255
Win32/Detnat.F Microsoft BackDoor.Pigeon.8793
Win32/Detnat.F Microsoft Trojan.DownLoader.4995
Win32/Detnat.F Microsoft Trojan.DownLoader.16531
Win32/Detnat.F Microsoft Trojan.DownLoader.14872
Win32/Detnat.F Microsoft Trojan.KeyLogger.1804
Win32/Detnat.F Microsoft Trojan.Stealth.50
Win32/Detnat.F Microsoft Trojan.Vanti
Win32/Detnat.F Microsoft BackDoor.Bifrost
Win32/Detnat.F Microsoft Trojan.MulDrop.4280
Win32/Detnat.F Microsoft Trojan.MulDrop.4377
Win32/Detnat.F Microsoft Trojan.MulDrop.4034
Win32/Detnat.F Microsoft Trojan.DownLoader.56152
Win32/Detnat.F Microsoft Trojan.PWS.Legmir.386
Win32/Detnat.F Microsoft BackDoor.Pigeon.2208
Win32/Detnat.F Microsoft Trojan.PWS.Clix
Win32/Detnat.F Microsoft Trojan.DownLoader.6198
Win32/Detnat.F Microsoft BackDoor.Pigeon.254
Win32/Detnat.F Microsoft Trojan.Topfox

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.