Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Email-Worm.Win32.Bagle.pac aliases:

Name Vendor Dr.Web classification name
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.DownLoader.3386
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.24576
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.19516
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.20271
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.38912
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.Mitglied
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.Spabot
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.DownLoader.3684
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.18944
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.33284
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.29700
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.31714
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.32768
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.33792
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.based
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.DownLoader.4262
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.34316
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.DownLoader.4343
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.12288
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.37888
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.BeagleProxy
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.3317
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.34304
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.MulDrop.3546
Email-Worm.Win32.Bagle.pac Kaspersky Trojan.MulDrop.3545
Email-Worm.Win32.Bagle.pac VirusBlokAda Trojan.Qhost
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.45082
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.33796
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.45083
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.33792
Email-Worm.Win32.Bagle.pac Kaspersky Win32.HLLM.Beagle.45087
Email-Worm.Win32.Bagle.pac VirusBlokAda Trojan.BeagleProxy
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.45083
Email-Worm.Win32.Bagle.pac VirusBlokAda Trojan.DownLoader.3386
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.31714
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.37888
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.18944
Email-Worm.Win32.Bagle.pac VirusBlokAda Trojan.DownLoader.3684
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.20271
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.3317
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.19516
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.32768
Email-Worm.Win32.Bagle.pac VirusBlokAda Win32.HLLM.Beagle.38912

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.