Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Unknown!Worm aliases:

Name Vendor Dr.Web classification name
Win32/Unknown!Worm Computer Associates Win32.Necronom.4096
Win32/Unknown!Worm Computer Associates Win32.Weather.8192
Win32/Unknown!Worm Computer Associates Win32.Urbe.16384
Win32/Unknown!Worm Computer Associates Win32.Urbe.20480
Win32/Unknown!Worm Computer Associates Win32.NGVCK.5371
Win32/Unknown!Worm Computer Associates Trojan.Proxy.172
Win32/Unknown!Worm Computer Associates BackDoor.Proxybot
Win32/Unknown!Worm Computer Associates BackDoor.Probot
Win32/Unknown!Worm Computer Associates Trojan.KeyLogger.40
Win32/Unknown!Worm Computer Associates Trojan.PWS.Kadun
Win32/Unknown!Worm Computer Associates Trojan.Proxy.356
Win32/Unknown!Worm Computer Associates FDOS.Buplik
Win32/Unknown!Worm Computer Associates Trojan.Proxy.150
Win32/Unknown!Worm Computer Associates Trojan.PWS.Jeem
Win32/Unknown!Worm Computer Associates BackDoor.Subhuman
Win32/Unknown!Worm Computer Associates BackDoor.Galaxy.11
Win32/Unknown!Worm Computer Associates Trojan.PWS.Narod
Win32/Unknown!Worm Computer Associates Trojan.Proxy.231
Win32/Unknown!Worm Computer Associates Trojan.Proxy.244
Win32/Unknown!Worm Computer Associates Trojan.DownLoader.1459
Win32/Unknown!Worm Computer Associates BackDoor.IRC.Thebug
Win32/Unknown!Worm Computer Associates Trojan.KeyLogger.87
Win32/Unknown!Worm Computer Associates BackDoor.PropagTest
Win32/Unknown!Worm Computer Associates BackDoor.DTR.13
Win32/Unknown!Worm Computer Associates BackDoor.Getoff
Win32/Unknown!Worm Computer Associates BackDoor.BoomRas
Win32/Unknown!Worm Computer Associates BackDoor.Helobos
Win32/Unknown!Worm Computer Associates BackDoor.AF
Win32/Unknown!Worm Computer Associates Trojan.Red.11
Win32/Unknown!Worm Computer Associates BackDoor.IRC.Sdbot
Win32/Unknown!Worm Computer Associates BackDoor.Spyboter
Win32/Unknown!Worm Computer Associates Win32.Nihilit.12288
Win32/Unknown!Worm Computer Associates Win32.HLLM.Hafun
Win32/Unknown!Worm Computer Associates BackDoor.IRC.Sdbot.based
Win32/Unknown!Worm Computer Associates Win32.HLLW.Protoride
Win32/Unknown!Worm Computer Associates Win32.Nihilit.61440
Win32/Unknown!Worm Computer Associates Win32.HLLW.Noname
Win32/Unknown!Worm Computer Associates Win32.HLLP.Gedzac.48573
Win32/Unknown!Worm Computer Associates Trojan.BeagleProxy
Win32/Unknown!Worm Computer Associates BackDoor.Asylum.100
Win32/Unknown!Worm Computer Associates Win32.Petik.8192
Win32/Unknown!Worm Computer Associates Win32.HLLM.Thonic
Win32/Unknown!Worm Computer Associates Trojan.PWS.LDPinch.260
Win32/Unknown!Worm Computer Associates Trojan.PWS.LDPinch.261
Win32/Unknown!Worm Computer Associates Trojan.PWS.LDPinch.309
Win32/Unknown!Worm Computer Associates BackDoor.IRC.Netbot
Win32/Unknown!Worm Computer Associates BackDoor.Small
Win32/Unknown!Worm Computer Associates Dialer.Sgrunt
Win32/Unknown!Worm Computer Associates Trojan.Stawin
Win32/Unknown!Worm Computer Associates BackDoor.BackBook

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.