Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32.Virut.5 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Win32.Virut.5
PE_VIRUT.XI-2 Trend Micro Win32.Virut.5
TR/PSW.LdPinch.fbq Avira Win32.Virut.5
BackDoor.Generic9.LEB AVG Win32.Virut.5
Trojan-PSW.Win32.LdPinch.fbq VirusBlokAda Win32.Virut.5
Trojan.Downloader.Delf.APP BitDefender Win32.Virut.5
TROJ_Generic.DIT Trend Micro Win32.Virut.5
PE_VIRUT.XS-3 Trend Micro Win32.Virut.5
PSW.Generic5.KVZ AVG Win32.Virut.5
not-a-virus:Porn-Dialer.Win32.GBDialer.i Kaspersky Win32.Virut.5
Dialer.FAB AVG Win32.Virut.5
Trojan.Generic.1406415 BitDefender Win32.Virut.5
TrojanDownloader:Win32/Zlob Microsoft Win32.Virut.5
Trojan.Generic.143583 BitDefender Win32.Virut.5
TROJ_AGENT.AKZJ Trend Micro Win32.Virut.5
Obfustat.KMR AVG Win32.Virut.5
Obfustat.FPG AVG Win32.Virut.5
TROJ_AMBLER.SMZ Trend Micro Win32.Virut.5
BackDoor-AWQ.b McAfee Win32.Virut.5
Backdoor.Win32.Hupigon.aowk Kaspersky Win32.Virut.5
BackDoor.Hupigon3.ADZT AVG Win32.Virut.5
Generic QHosts.d McAfee Win32.Virut.5
TrojanDropper:Win32/Logsnif Microsoft Win32.Virut.5
Trojan.Win32.Qhost.it Kaspersky Win32.Virut.5
Malware-Cryptor.Win32.General.3 VirusBlokAda Win32.Virut.5
Generic7.HLY AVG Win32.Virut.5
TROJ_SPAMBOT.B Trend Micro Win32.Virut.5
Obfustat.KCB AVG Win32.Virut.5
Downloader.Tibs.4.K AVG Win32.Virut.5
WORM_NUCRP.GEN Trend Micro Win32.Virut.5
Backdoor.Vanbot.FK BitDefender Win32.Virut.5
Generic7.XC AVG Win32.Virut.5
Backdoor.Win32.Hupigon.atfb Kaspersky Win32.Virut.5
Generic9.AWVU AVG Win32.Virut.5
PE_VIRUT.E-1 Trend Micro Win32.Virut.5
Trojan-Downloader.Win32.VB.atk Kaspersky Win32.Virut.5
W32/Sdbot.worm.gen.h McAfee Win32.Virut.5
Net-Worm.Win32.Kolabc.dmm VirusBlokAda Win32.Virut.5
TROJ_PAKES.RIT Trend Micro Win32.Virut.5
Virus:Win32/Virut.gen!AI Microsoft Win32.Virut.5
Packer.Malware.VPacker.B BitDefender Win32.Virut.5
Virus:Win32/Virut.gen!L Microsoft Win32.Virut.5
Worm:Win32/Agent Microsoft Win32.Virut.5
TrojanProxy:Win32/Ranky.GV Microsoft Win32.Virut.5
Trojan-Proxy.Win32.Agent.mf VirusBlokAda Win32.Virut.5
TROJ_PROXY.UI Trend Micro Win32.Virut.5
Obfustat.KCH AVG Win32.Virut.5
Obfustat.KKY AVG Win32.Virut.5
I-Worm/VB.GV AVG Win32.Virut.5
Worm/Agent.26624 Avira Win32.Virut.5

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.