My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets


Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32.HLLW.Gavir.54 aliases:

Name Vendor Dr.Web classification name Kaspersky Win32.HLLW.Gavir.54
Worm/Delf.ZL AVG Win32.HLLW.Gavir.54
Win32.HLLW.Gavir.A BitDefender Win32.HLLW.Gavir.54
PE_LOOKED.MN-O Trend Micro Win32.HLLW.Gavir.54
Worm/Delf.AUQ AVG Win32.HLLW.Gavir.54
Worm.Generic.7553 BitDefender Win32.HLLW.Gavir.54
PE_LOOKED.ACA-O Trend Micro Win32.HLLW.Gavir.54
PE_LOOKED.DC Trend Micro Win32.HLLW.Gavir.54
PE_LOOKED.NP Trend Micro Win32.HLLW.Gavir.54
W32/ McAfee Win32.HLLW.Gavir.54
Win32.Worm.Viking.CB BitDefender Win32.HLLW.Gavir.54
Virus:Win32/Viking.HI Microsoft Win32.HLLW.Gavir.54
Generic3.GOX AVG Win32.HLLW.Gavir.54
PE_LOOKED.XI Trend Micro Win32.HLLW.Gavir.54
Worm/Delf.BPS AVG Win32.HLLW.Gavir.54
Worm/Delf.APU AVG Win32.HLLW.Gavir.54
Worm/Delf.ABK AVG Win32.HLLW.Gavir.54
Virus:Win32/Viking.HU Microsoft Win32.HLLW.Gavir.54
Worm/Delf.BQF AVG Win32.HLLW.Gavir.54
Worm/Delf.BYD AVG Win32.HLLW.Gavir.54
W32/HLLP.Philis.dr McAfee Win32.HLLW.Gavir.54
PE_LOOKED.CU Trend Micro Win32.HLLW.Gavir.54
Worm/Delf.BOT AVG Win32.HLLW.Gavir.54
Worm.Win32.Viking.fe Kaspersky Win32.HLLW.Gavir.54
Worm/Delf.ACU AVG Win32.HLLW.Gavir.54
W32/HLLP.Philis.fc McAfee Win32.HLLW.Gavir.54
Worm.Win32.Viking.fd Kaspersky Win32.HLLW.Gavir.54
Worm/Delf.AKA AVG Win32.HLLW.Gavir.54
Win32.Worm.Viking.FD BitDefender Win32.HLLW.Gavir.54
Worm/Delf.AMO AVG Win32.HLLW.Gavir.54
Win32.Worm.Viking.CT BitDefender Win32.HLLW.Gavir.54
W32/HLLP.Philis.iw McAfee Win32.HLLW.Gavir.54
Backdoor.Win32.Hupigon.ach Kaspersky Win32.HLLW.Gavir.54
BackDoor.Generic5.JCM AVG Win32.HLLW.Gavir.54
Win32.Worm.Viking.LV BitDefender Win32.HLLW.Gavir.54
PE_LOOKED.RP-O Trend Micro Win32.HLLW.Gavir.54
Worm/Brontok.C Avira Win32.HLLW.Gavir.54
Worm:Win32/Brontok@mm Microsoft Win32.HLLW.Gavir.54
PE_LOOKED.KX-O Trend Micro Win32.HLLW.Gavir.54
W32/HLLP.Philis.ia McAfee Win32.HLLW.Gavir.54
Virus:Win32/Viking.HZ Microsoft Win32.HLLW.Gavir.54
W32/Downloader.E Avira Win32.HLLW.Gavir.54
Win32/PEPatch.AD AVG Win32.HLLW.Gavir.54
PE_MUMAWOW.AG Trend Micro Win32.HLLW.Gavir.54
TR/Vundo.Gen Avira Win32.HLLW.Gavir.54
Worm/Delf.ACG AVG Win32.HLLW.Gavir.54
Worm/Delf.ABW AVG Win32.HLLW.Gavir.54
W32/HLLP.Philis.hx McAfee Win32.HLLW.Gavir.54
Virus:Win32/Viking.HY Microsoft Win32.HLLW.Gavir.54
Worm/Delf.AZK AVG Win32.HLLW.Gavir.54

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.