Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Worm:Win32/Agent aliases:

Name Vendor Dr.Web classification name
Worm:Win32/Agent Microsoft Win32.HLLW.Autoruner.993
Worm:Win32/Agent Microsoft Win32.HLLM.Kelaino.7
Worm:Win32/Agent Microsoft Trojan.Debel
Worm:Win32/Agent Microsoft Trojan.DownLoader.62308
Worm:Win32/Agent Microsoft Trojan.DownLoader.18997
Worm:Win32/Agent Microsoft BackDoor.Generic.1120
Worm:Win32/Agent Microsoft Trojan.DownLoader.17788
Worm:Win32/Agent Microsoft BackDoor.Generic.960
Worm:Win32/Agent Microsoft BackDoor.IRC.Sdbot.832
Worm:Win32/Agent Microsoft BackDoor.BOrifice.121
Worm:Win32/Agent Microsoft Trojan.DownLoader.19744
Worm:Win32/Agent Microsoft BackDoor.Oscar
Worm:Win32/Agent Microsoft BackDoor.IRC.Sdbot.1201
Worm:Win32/Agent Microsoft Win32.HLLW.Horse
Worm:Win32/Agent Microsoft Win32.HLLW.Autoruner
Worm:Win32/Agent Microsoft Win32.HLLM.Generic.418
Worm:Win32/Agent Microsoft Win32.HLLW.Viking
Worm:Win32/Agent Microsoft Win32.HLLW.Honok
Worm:Win32/Agent Microsoft Trojan.DownLoader.19764
Worm:Win32/Agent Microsoft BackDoor.Crvic
Worm:Win32/Agent Microsoft Win32.HLLW.Autoruner.131
Worm:Win32/Agent Microsoft Trojan.DownLoader.17931
Worm:Win32/Agent Microsoft Trojan.PWS.Legmir.897
Worm:Win32/Agent Microsoft BackDoor.IRC.Sdbot.1424
Worm:Win32/Agent Microsoft BackDoor.IRC.Sdbot.1454
Worm:Win32/Agent Microsoft Trojan.StartPage.20015
Worm:Win32/Agent Microsoft Trojan.DownLoader.24645
Worm:Win32/Agent Microsoft Trojan.DownLoader.22657
Worm:Win32/Agent Microsoft Win32.HLLM.Limar
Worm:Win32/Agent Microsoft Win32.HLLM.Kelaino.3
Worm:Win32/Agent Microsoft Win32.HLLW.Autoruner.399
Worm:Win32/Agent Microsoft Win32.HLLW.Judge
Worm:Win32/Agent Microsoft DDoS.Rincux
Worm:Win32/Agent Microsoft Win32.HLLW.Autoruner.485
Worm:Win32/Agent Microsoft Win32.HLLM.Generic.438
Worm:Win32/Agent Microsoft Trojan.MulDrop.9188
Worm:Win32/Agent Microsoft Win32.HLLW.Xiquit
Worm:Win32/Agent Microsoft Win32.HLLW.Dokill
Worm:Win32/Agent Microsoft Trojan.DownLoader.35029
Worm:Win32/Agent Microsoft Trojan.Inject.474
Worm:Win32/Agent Microsoft Win32.HLLW.Holl
Worm:Win32/Agent Microsoft BackDoor.Spec
Worm:Win32/Agent Microsoft Win32.HLLW.Autoruner.981
Worm:Win32/Agent Microsoft Win32.HLLW.Sei
Worm:Win32/Agent Microsoft Win32.Dref.32256
Worm:Win32/Agent Microsoft Win32.HLLW.Plict.3
Worm:Win32/Agent Microsoft Win32.HLLW.Oscar
Worm:Win32/Agent Microsoft Win32.HLLW.MyBot.based
Worm:Win32/Agent Microsoft Trojan.DMailer
Worm:Win32/Agent Microsoft Trojan.Kokq

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.