The page may not load correctly.
Scentralizowana ochrona Dr.Web Enterprise Security Suite
dla wszystkich hostów sieci firmowej
Więcej
Dla stałych użytkowników
Rabaty
Pakiet dla małych przedsiębiorstw
5–50 komputerów PC
10–200 komputerów PC
Leczenie dla sieci
Leczenie komputerów PC i serwerów
Skanowanie plików i adresów URL
Wtyczki do przeglądarek
Dr.Web ATM Shield
Scentralizowana ochrona systemów wbudowanych (bankomatów, terminali i multikiosków). Więcej
Dla producentów urządzeń
Dr.Web vxCube
Dochodzenia VCI
Use Dr.Web vxCube to check whether your concerns are legitimate
In just a minute, you will find out whether the file is malicious (and if it is, how harmful it is) and receive a detailed report that includes a video showing how the file is operating in the system and making modifications to it, and what nodes it is connecting to. You will also see its network activity map and more.
Dr.Web vxCube – doesn't just perform an analysis; it also instantly delivers an antidote—
a custom Dr.Web CureIt! build that will neutralise the brand-new, previously unknown malicious program.
If the analysis determines that Dr.Web is not yet able to detect the submitted file, a custom Dr.Web CureIt! build will be generated for you to cure your system.
Thanks to Dr.Web CureIt!'s versatility, it can operate without being installed in any system already relying on a different anti-virus. The service will particularly come in handy for companies that don't yet use Dr.Web as their primary anti-virus defence.
If you want to control the analysis in interactive mode, make sure your browser is not configured to block pop-ups.
As a rule, an analysis is conducted in one minute or less, but if the examiner believes that amount of time was insufficient to analyse the suspicious file thoroughly, the desired analysis time can be specified in the settings.
The file is executed on the virtual machine's desktop.
The analysis determines the file's harmfulness score (from 0 to 100); a detailed report is also provided. Reports contain the list of actions taken by an object and a video demonstration of them.
All the analysed program’s actions are filmed. The recording can be used in a subsequent analysis—you can observe the malicious object in action.
You will also be provided with technical information, including the nodes the analysed file communicates with, the list of files it creates, the registry entries it alters, and much more. You can view reports in your account area or download them as archive files. Report examples.