Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Worm:AutoIt/Renocide.gen!A aliases:

Name Vendor Dr.Web classification name
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5300
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6535
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6369
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6262
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6303
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5500
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6241
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5902
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6012
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6206
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6048
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.9636
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6099
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6238
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5624
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6259
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6248
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autohit.6242
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5685
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6128
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6127
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6056
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5577
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5547
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5899
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5950
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6145
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5589
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6040
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6055
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6113
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5548
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6096
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5901
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5726
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6114
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6059
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5499
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5916
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5907
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5770
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5527
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6071
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5981
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5787
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6107
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6051
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.5778
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6064
Worm:AutoIt/Renocide.gen!A Microsoft Win32.HLLW.Autoruner.6031

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.