Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Copyself aliases:

Name Vendor Dr.Web classification name
WORM_AGENT.PIL Trend Micro Trojan.Copyself
Generic.dl McAfee Trojan.Copyself
TR/Delf.RE Avira Trojan.Copyself
Win32/Delf Microsoft Trojan.Copyself
Worm.Win32.Delf.al Kaspersky Trojan.Copyself
Generic.NTC AVG Trojan.Copyself
Worm.Win32.Delf.al VirusBlokAda Trojan.Copyself
Win32.Worm.Delf.AL BitDefender Trojan.Copyself
WORM_AGENT.AEKF Trend Micro Trojan.Copyself
BDS/Delf.ajp.1 Avira Trojan.Copyself
TR/Delf.LC Avira Trojan.Copyself
Generic.dc McAfee Trojan.Copyself
Trojan.Win32.Delf.lc Kaspersky Trojan.Copyself
Generic3.CET AVG Trojan.Copyself
Trojan.Delf.LC BitDefender Trojan.Copyself
PAK_Generic.001 Trend Micro Trojan.Copyself
Win32/VB.FU Microsoft Trojan.Copyself
Worm/VB.BEV AVG Trojan.Copyself
Trojan.VB.NRG BitDefender Trojan.Copyself
TR/Crypt.FKM.Gen Avira Trojan.Copyself
New Malware.an McAfee Trojan.Copyself
Win32/Obfuscator.S Microsoft Trojan.Copyself
Packed.Win32.PePatch.dk Kaspersky Trojan.Copyself
Packed.CryptoCrack AVG Trojan.Copyself
Possible_Virus Trend Micro Trojan.Copyself
Worm/Agent.AE Avira Trojan.Copyself
Generic.dx McAfee Trojan.Copyself
P2P-Worm.Win32.Agent.ae Kaspersky Trojan.Copyself
Agent.DTC AVG Trojan.Copyself
Win32.Worm.P2p.Agent.AE BitDefender Trojan.Copyself
PSW.Generic4.FWH AVG Trojan.Copyself
Trojan.Pws.Vb.KP BitDefender Trojan.Copyself
Worm/Agent.AL.2 Avira Trojan.Copyself
TR/VB.ajq.8 Avira Trojan.Copyself
Win32/Bootmerlin Microsoft Trojan.Copyself
Trojan.Generic.222598 BitDefender Trojan.Copyself
W32/VB.O Avira Trojan.Copyself
Virus:Win32/VB.O Microsoft Trojan.Copyself
Worm/VB.ASZ AVG Trojan.Copyself
Virus.Win32.VB.o VirusBlokAda Trojan.Copyself
Trojan.Copyself.G BitDefender Trojan.Copyself
WORM_SILLYFDC.AC Trend Micro Trojan.Copyself
TR/Crypt.Morphine.Gen Avira Trojan.Copyself
Worm.Win32.Perlovga.e Kaspersky Trojan.Copyself
Packed.Morphine.c AVG Trojan.Copyself
Worm.Win32.Perlovga.a VirusBlokAda Trojan.Copyself
Possible_Mlwr-13 Trend Micro Trojan.Copyself
Worm/Chirem.A.1 Avira Trojan.Copyself
Win32/Chirem.B Microsoft Trojan.Copyself
Worm/Chirem.A AVG Trojan.Copyself

1 2 3 4 5 6

Trojan.Copyself in virus library:

Trojan.Copyself.101
Trojan.Copyself.102
Trojan.Copyself.112
Trojan.Copyself.113
Trojan.Copyself.115
Trojan.Copyself.116
Trojan.Copyself.117
Trojan.Copyself.118
Trojan.Copyself.12.origin
Trojan.Copyself.120
Trojan.Copyself.121
Trojan.Copyself.123
Trojan.Copyself.124
Trojan.Copyself.125
Trojan.Copyself.127
Trojan.Copyself.128
Trojan.Copyself.133
Trojan.Copyself.134
Trojan.Copyself.146
Trojan.Copyself.147
Trojan.Copyself.149
Trojan.Copyself.150
Trojan.Copyself.154
Trojan.Copyself.155
Trojan.Copyself.162
Trojan.Copyself.163
Trojan.Copyself.191
Trojan.Copyself.56
Trojan.Copyself.58
Trojan.Copyself.80
Trojan.Copyself.85
Trojan.Copyself.98

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.