Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Corrupted.Win32File.ILE aliases:

Name Vendor Dr.Web classification name
Corrupted.Win32File.ILE VirusBlokAda Win32.HLLM.Beagle.45171
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Rxbot
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Siggen.6
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Sdbot.1462
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Sdbot.1276
Corrupted.Win32File.ILE VirusBlokAda BackDoor.Dersp
Corrupted.Win32File.ILE VirusBlokAda Win32.HLLW.ForBot
Corrupted.Win32File.ILE VirusBlokAda Trojan.DnsChange
Corrupted.Win32File.ILE VirusBlokAda Trojan.MulDrop.10005
Corrupted.Win32File.ILE VirusBlokAda Trojan.MulDrop.4738
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Sdbot.2117
Corrupted.Win32File.ILE VirusBlokAda Trojan.DnsChange.973
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Sdbot.5242
Corrupted.Win32File.ILE VirusBlokAda Trojan.PWS.Banker.22631
Corrupted.Win32File.ILE VirusBlokAda Win32.HLLM.Beagle
Corrupted.Win32File.ILE VirusBlokAda Trojan.DownLoad.35931
Corrupted.Win32File.ILE VirusBlokAda Trojan.LanAgent
Corrupted.Win32File.ILE VirusBlokAda Trojan.EmailSpy
Corrupted.Win32File.ILE VirusBlokAda Win32.HLLW.Hutley
Corrupted.Win32File.ILE VirusBlokAda BackDoor.Pushnik.3
Corrupted.Win32File.ILE VirusBlokAda Trojan.PWS.Wsgame.12824
Corrupted.Win32File.ILE VirusBlokAda Trojan.Click.17722
Corrupted.Win32File.ILE VirusBlokAda Trojan.Virtumod.407
Corrupted.Win32File.ILE VirusBlokAda Trojan.DownLoad.29056
Corrupted.Win32File.ILE VirusBlokAda Trojan.PWS.Wsgame.10522
Corrupted.Win32File.ILE VirusBlokAda Trojan.PWS.LDPinch.403
Corrupted.Win32File.ILE VirusBlokAda Trojan.Spambot.2541
Corrupted.Win32File.ILE VirusBlokAda Trojan.DnsChange.966
Corrupted.Win32File.ILE VirusBlokAda BackDoor.Agobot.24
Corrupted.Win32File.ILE VirusBlokAda Adware.NaviPromo
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Sdbot.1453
Corrupted.Win32File.ILE VirusBlokAda Trojan.PWS.Banker.20366
Corrupted.Win32File.ILE VirusBlokAda Trojan.DownLoad1.37178
Corrupted.Win32File.ILE VirusBlokAda Trojan.Winlock.1046
Corrupted.Win32File.ILE VirusBlokAda Trojan.Winlock.1032
Corrupted.Win32File.ILE VirusBlokAda Trojan.Winlock.1071
Corrupted.Win32File.ILE VirusBlokAda Trojan.Fakealert.11832
Corrupted.Win32File.ILE VirusBlokAda Trojan.Winlock.1098
Corrupted.Win32File.ILE VirusBlokAda Trojan.Proxy.5827
Corrupted.Win32File.ILE VirusBlokAda Trojan.Spambot.3541
Corrupted.Win32File.ILE VirusBlokAda Trojan.DownLoader.36521
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Sdbot.4991
Corrupted.Win32File.ILE VirusBlokAda Win32.HLLW.Rxbot
Corrupted.Win32File.ILE VirusBlokAda Trojan.PWS.Nerf
Corrupted.Win32File.ILE VirusBlokAda Trojan.DownLoader.37195
Corrupted.Win32File.ILE VirusBlokAda BackDoor.Before
Corrupted.Win32File.ILE VirusBlokAda BackDoor.IRC.Sdbot.5267
Corrupted.Win32File.ILE VirusBlokAda Trojan.Click.19370
Corrupted.Win32File.ILE VirusBlokAda Trojan.DownLoader.39209
Corrupted.Win32File.ILE VirusBlokAda BackDoor.Pigeon.3146

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.