Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Worm:Win32/Hamweq.A aliases:

Name Vendor Dr.Web classification name
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.5484
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Flooder.1
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3446
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3437
Worm:Win32/Hamweq.A Microsoft BackDoor.IRC.Flood.8
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3511
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.2572
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3425
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.2077
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3265
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3448
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3512
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.2339
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3513
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.5468
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.5422
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3488
Worm:Win32/Hamweq.A Microsoft Trojan.Packed.162
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6367
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.5428
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.5456
Worm:Win32/Hamweq.A Microsoft Trojan.MulDrop.29448
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.5314
Worm:Win32/Hamweq.A Microsoft Trojan.DownLoad.26723
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6363
Worm:Win32/Hamweq.A Microsoft BackDoor.Poison.61
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6428
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6396
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6412
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6478
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6451
Worm:Win32/Hamweq.A Microsoft Trojan.DownLoad.32746
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.origin
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.5665
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6554
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6557
Worm:Win32/Hamweq.A Microsoft Win32.Virut.56
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6608
Worm:Win32/Hamweq.A Microsoft Trojan.DownLoader.50183
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.7229
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3163
Worm:Win32/Hamweq.A Microsoft DDoS.Cirio
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3032
Worm:Win32/Hamweq.A Microsoft Trojan.DownLoader.58784
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.2012
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3914
Worm:Win32/Hamweq.A Microsoft Trojan.Inject.3407
Worm:Win32/Hamweq.A Microsoft Win32.HLLW.Autoruner.6647
Worm:Win32/Hamweq.A Microsoft Trojan.Swizzor.4352
Worm:Win32/Hamweq.A Microsoft BackDoor.IRC.Sdbot.3662

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.