Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Bagle.gen@MM aliases:

Name Vendor Dr.Web classification name
W32/Bagle.gen@MM McAfee Trojan.PWS.Vipgsm
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.18848
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.21504
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.26966
W32/Bagle.gen@MM McAfee Trojan.DownLoader.6087
W32/Bagle.gen@MM McAfee Win32.HLLM.Postcard
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.49152
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.34304
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.36352
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.36864
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.9219
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.37888
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.24576
W32/Bagle.gen@MM McAfee Trojan.DownLoader.5882
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.37694
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.32768
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.33800
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.19460
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.29700
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.45056
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.25088
W32/Bagle.gen@MM McAfee Trojan.MailSpam
W32/Bagle.gen@MM McAfee Trojan.PWS.LDPinch.534
W32/Bagle.gen@MM McAfee Trojan.PWS.LDPinch.520
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.27136
W32/Bagle.gen@MM McAfee Trojan.BeagleProxy
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.26112
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.19829
W32/Bagle.gen@MM McAfee Trojan.DownLoader.4959
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.based
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.39459
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.65403
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.21294
W32/Bagle.gen@MM McAfee Trojan.PWS.LDPinch.1009
W32/Bagle.gen@MM McAfee Trojan.MulDrop.2304
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.35306
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.35813
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.47624
W32/Bagle.gen@MM McAfee Trojan.MulDrop.14080
W32/Bagle.gen@MM McAfee Trojan.PWS.Hanne
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.33284
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.39428
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.32256
W32/Bagle.gen@MM McAfee Trojan.MulDrop.921
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.45082
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.33796
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.45083
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.19968
W32/Bagle.gen@MM McAfee Win32.HLLM.Beagle.45088

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.