Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Worm:Win32/Autorun.gen!inf aliases:

Name Vendor Dr.Web classification name
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.5049
Worm:Win32/Autorun.gen!inf Microsoft Trojan.PWS.Wsgame.4983
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.6551
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1756
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1750
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.6129
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1821
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1789
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2150
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2205
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2133
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2254
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2206
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2148
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2210
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2166
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2272
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2171
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2158
Worm:Win32/Autorun.gen!inf Microsoft Trojan.PWS.Wsgame.7042
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2557
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLM.MyDoom.130
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2240
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2161
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2339
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1410
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2169
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2375
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2401
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.6521
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1468
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1460
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1459
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2138
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2726
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2702
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1276
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1413
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.3254
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1977
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2077
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2090
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2026
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2048
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1856
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2507
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.2373
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1976
Worm:Win32/Autorun.gen!inf Microsoft Win32.HLLW.Autoruner.1883

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.