Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PE_VIRUT.GEN-2 aliases:

Name Vendor Dr.Web classification name
PE_VIRUT.GEN-2 Trend Micro Trojan.MulDrop.4595
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.Autoruner.882
PE_VIRUT.GEN-2 Trend Micro Win32.Virut.9156
PE_VIRUT.GEN-2 Trend Micro Win32.Virut.5
PE_VIRUT.GEN-2 Trend Micro BackDoor.Evit.2
PE_VIRUT.GEN-2 Trend Micro Trojan.MulDrop.8715
PE_VIRUT.GEN-2 Trend Micro Trojan.MulDrop.8700
PE_VIRUT.GEN-2 Trend Micro BackDoor.IRC.Sdbot.1371
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.Autoruner.1979
PE_VIRUT.GEN-2 Trend Micro BackDoor.Pigeon.11493
PE_VIRUT.GEN-2 Trend Micro Trojan.DownLoader.24772
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.Veder
PE_VIRUT.GEN-2 Trend Micro Trojan.MulDrop.6502
PE_VIRUT.GEN-2 Trend Micro Trojan.Starman
PE_VIRUT.GEN-2 Trend Micro Trojan.MulDrop.13277
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.Autoruner.214
PE_VIRUT.GEN-2 Trend Micro BackDoor.IRC.Combot
PE_VIRUT.GEN-2 Trend Micro Trojan.Popuper.4983
PE_VIRUT.GEN-2 Trend Micro Trojan.SCKeyLog.44
PE_VIRUT.GEN-2 Trend Micro Win32.NGVCK.2621
PE_VIRUT.GEN-2 Trend Micro Trojan.DownLoader.45546
PE_VIRUT.GEN-2 Trend Micro BackDoor.Zdemon.127
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.MyBot.125
PE_VIRUT.GEN-2 Trend Micro BackDoor.Bulknet.63
PE_VIRUT.GEN-2 Trend Micro Trojan.PWS.Wsgame.3801
PE_VIRUT.GEN-2 Trend Micro Trojan.PWS.Gamania.4240
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.Autoruner.2868
PE_VIRUT.GEN-2 Trend Micro Trojan.PWS.Gamania.3935
PE_VIRUT.GEN-2 Trend Micro Trojan.PWS.Gamania.3992
PE_VIRUT.GEN-2 Trend Micro Program.Ardamax
PE_VIRUT.GEN-2 Trend Micro Trojan.DownLoader.63599
PE_VIRUT.GEN-2 Trend Micro Trojan.DownLoader.33442
PE_VIRUT.GEN-2 Trend Micro BackDoor.IRC.Sdbot.2665
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.Agobot
PE_VIRUT.GEN-2 Trend Micro Trojan.Proxy.1724
PE_VIRUT.GEN-2 Trend Micro BackDoor.Iam
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.Autoruner.7785
PE_VIRUT.GEN-2 Trend Micro Trojan.DownLoad.40043
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.MyBot.5048
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.MyBot.4457
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.MyBot.3785
PE_VIRUT.GEN-2 Trend Micro Trojan.PWS.Gamania.4080
PE_VIRUT.GEN-2 Trend Micro Trojan.PWS.Wsgame.3800
PE_VIRUT.GEN-2 Trend Micro Trojan.Fakealert
PE_VIRUT.GEN-2 Trend Micro Trojan.PWS.Wsgame.1209
PE_VIRUT.GEN-2 Trend Micro Trojan.Siggen.63961
PE_VIRUT.GEN-2 Trend Micro Win32.HLLW.MyBot.4295
PE_VIRUT.GEN-2 Trend Micro BackDoor.IRC.Sdbot.945
PE_VIRUT.GEN-2 Trend Micro Trojan.DownLoad.413
PE_VIRUT.GEN-2 Trend Micro Trojan.DownLoader.32571

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.