Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic!atr aliases:

Name Vendor Dr.Web classification name
Generic!atr McAfee VBS.Autoruner.8
Generic!atr McAfee Win32.HLLW.Autoruner
Generic!atr McAfee Win32.HLLW.Autoruner.1236
Generic!atr McAfee Win32.HLLW.Autoruner.1229
Generic!atr McAfee Win32.HLLW.Autoruner.921
Generic!atr McAfee Win32.HLLW.Autoruner.1416
Generic!atr McAfee Win32.HLLW.Autoruner.1402
Generic!atr McAfee Win32.HLLW.Autoruner.476
Generic!atr McAfee Worm.Batman
Generic!atr McAfee Win32.HLLW.Autoruner.1435
Generic!atr McAfee Win32.HLLW.Autoruner.412
Generic!atr McAfee Win32.HLLW.Autoruner.2536
Generic!atr McAfee Win32.HLLW.Autoruner.2281
Generic!atr McAfee BackDoor.Beizhu.945
Generic!atr McAfee Win32.HLLW.Autoruner.137
Generic!atr McAfee Win32.HLLW.Autoruner.848
Generic!atr McAfee Win32.HLLW.Autoruner.1707
Generic!atr McAfee Win32.HLLW.Autoruner.1465
Generic!atr McAfee Trojan.Recycle
Generic!atr McAfee Win32.HLLW.Unjap
Generic!atr McAfee Win32.HLLW.Autoruner.1086
Generic!atr McAfee Win32.HLLW.Autoruner.1284
Generic!atr McAfee Win32.HLLW.Autoruner.1346
Generic!atr McAfee Win32.HLLW.Autoruner.1285
Generic!atr McAfee Win32.HLLW.Autoruner.131
Generic!atr McAfee Win32.HLLW.Autoruner.2130
Generic!atr McAfee Win32.HLLW.Autoruner.2208
Generic!atr McAfee VBS.Autoruner.11
Generic!atr McAfee Win32.HLLW.Autoruner.1269
Generic!atr McAfee Win32.HLLW.Autoruner.295
Generic!atr McAfee Win32.HLLW.Autoruner.274
Generic!atr McAfee Win32.HLLW.Autoruner.299
Generic!atr McAfee Win32.HLLW.Autoruner.294
Generic!atr McAfee VBS.Autoruner.6
Generic!atr McAfee Win32.HLLW.Autoruner.1002
Generic!atr McAfee Win32.HLLW.Autoruner.1031
Generic!atr McAfee Win32.HLLW.Autoruner.1050
Generic!atr McAfee Win32.HLLW.Autoruner.2302
Generic!atr McAfee Win32.HLLW.Autoruner.270
Generic!atr McAfee Win32.HLLW.Autoruner.1814
Generic!atr McAfee Win32.HLLW.Autoruner.1842
Generic!atr McAfee Worm.Peerav
Generic!atr McAfee Win32.HLLW.Autoruner.1887
Generic!atr McAfee Win32.HLLW.Autoruner.2504
Generic!atr McAfee Win32.HLLW.Autoruner.1252
Generic!atr McAfee VBS.Autoruner.12
Generic!atr McAfee Win32.HLLW.Autoruner.1249
Generic!atr McAfee Win32.HLLW.Autoruner.576
Generic!atr McAfee Win32.HLLW.Autoruner.1678
Generic!atr McAfee Win32.HLLW.Autoruner.1489

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.