Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32.HLLP.Rox aliases:

Name Vendor Dr.Web classification name
W32/Xorer.DU Avira Win32.HLLP.Rox
Virus.Win32.Xorer.dt Kaspersky Win32.HLLP.Rox
Virus.Win32.Xorer.c VirusBlokAda Win32.HLLP.Rox
Generic10.BLP AVG Win32.HLLP.Rox
Worm.Generic.18062 BitDefender Win32.HLLP.Rox
PAK_Generic.001 Trend Micro Win32.HLLP.Rox
TR/Xorer.DR.40960 Avira Win32.HLLP.Rox
Trojan:Win32/Xorer.O Microsoft Win32.HLLP.Rox
Generic9.ATQA AVG Win32.HLLP.Rox
Win32.Xorer.DU BitDefender Win32.HLLP.Rox
TROJ_PAGIPEF.BL Trend Micro Win32.HLLP.Rox
HTML/Xorer Avira Win32.HLLP.Rox
Virus.Win32.Xorer.du Kaspersky Win32.HLLP.Rox
Generic9.AXAZ AVG Win32.HLLP.Rox
Trojan.HTML.Xorer.A BitDefender Win32.HLLP.Rox
HTML_AGENT.AFBL Trend Micro Win32.HLLP.Rox
TR/Crypt.XDR.Gen Avira Win32.HLLP.Rox
Virus.Win32.Xorer.dr Kaspersky Win32.HLLP.Rox
Trojan.Rox VirusBlokAda Win32.HLLP.Rox
Generic9.AWMF AVG Win32.HLLP.Rox
Trojan.Xorer.S BitDefender Win32.HLLP.Rox
PE_PAGIPEF.BU Trend Micro Win32.HLLP.Rox
TR/Crypt.CFI.Gen Avira Win32.HLLP.Rox
Win32.Xorer.DV BitDefender Win32.HLLP.Rox
PE_PAGIPEF.BZ Trend Micro Win32.HLLP.Rox
Generic9.BFAC AVG Win32.HLLP.Rox
Worm.Generic.16833 BitDefender Win32.HLLP.Rox
TR/Xorer.A.1 Avira Win32.HLLP.Rox
Generic9.AWOQ AVG Win32.HLLP.Rox
PE_PAGIPEF.AZ-O Trend Micro Win32.HLLP.Rox
Virus:JS/Xorer.J Microsoft Win32.HLLP.Rox
Trojan.VBS.Starter.a VirusBlokAda Win32.HLLP.Rox
TR/Agent.dzc.1 Avira Win32.HLLP.Rox
Generic3.KKD AVG Win32.HLLP.Rox
PE_SWICH.A Trend Micro Win32.HLLP.Rox
RKIT/Xorer.A.11 Avira Win32.HLLP.Rox
Win32/Xorer.H Microsoft Win32.HLLP.Rox
Virus.Win32.Xorer.dv Kaspersky Win32.HLLP.Rox
Generic9.AVMY AVG Win32.HLLP.Rox
Rootkit.Xorer.A BitDefender Win32.HLLP.Rox
TROJ_PAGIPEF.AZ Trend Micro Win32.HLLP.Rox
TR/Spy.Gen Avira Win32.HLLP.Rox
Virus.Win32.Xorer.ee Kaspersky Win32.HLLP.Rox
Agent.3.J AVG Win32.HLLP.Rox
Win32.Xorer.ED BitDefender Win32.HLLP.Rox
TSPY_ONLINEGA.AE Trend Micro Win32.HLLP.Rox
Win32/Xorer.D Microsoft Win32.HLLP.Rox
AdClicker-EY McAfee Win32.HLLP.Rox
PSW.Agent.7.M AVG Win32.HLLP.Rox
Trojan.Agent.AGRU BitDefender Win32.HLLP.Rox

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.