Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Intended.Virus aliases:

Name Vendor Dr.Web classification name
Intended.Virus Symantec Zombie.dropper.1889
Intended.Virus Symantec Zombie.dropper.1922
Intended.Virus Symantec SillyC.160
Intended.Virus Symantec Win.Padania.2290
Intended.Virus Symantec Win32.Dictator.5632
Intended.Virus Symantec Win32.HLLM.Hafun
Intended.Virus Symantec Win32.IRC.Bot
Intended.Virus Symantec Win32.HLLW.MyBot
Intended.Virus Symantec Win32.Netav.12288
Intended.Virus Symantec Win32.HLLW.Agobot
Intended.Virus Symantec Win32.Detox
Intended.Virus Symantec Win32.BrokenFace
Intended.Virus Symantec Vanq.688
Intended.Virus Symantec VirusConstructor.based
Intended.Virus Symantec TPVO.3464
Intended.Virus Symantec Trivial.59
Intended.Virus Symantec HLLP.Blender
Intended.Virus Symantec Ramones
Intended.Virus Symantec Rajaat.871
Intended.Virus Symantec SeeYou.dropper.1
Intended.Virus Symantec Nutcracker.AB2.6425
Intended.Virus Symantec Nutcracker.AB2.6500
Intended.Virus Symantec Nutcracker.AB2.6982
Intended.Virus Symantec Bingger.489
Intended.Virus Symantec Michelangelo
Intended.Virus Symantec MemLapse.366
Intended.Virus Symantec Leprosy.Seneca.483
Intended.Virus Symantec BootCom.Frizer.150
Intended.Virus Symantec Hypervisor.dropper.3120
Intended.Virus Symantec HLLP.Duke.2046
Intended.Virus Symantec Conspiracy.1395
Intended.Virus Symantec Gellukkige.335
Intended.Virus Symantec IVP.based
Intended.Virus Symantec Cry.30577
Intended.Virus Symantec AntiCachacha.400
Intended.Virus Symantec Zhengxi.7307
Intended.Virus Symantec Zombie.dropper.16384
Intended.Virus Symantec Jdc.7616
Intended.Virus Symantec Funky.692
Intended.Virus Symantec Trivial.52
Intended.Virus Symantec Zhengxi.7271
Intended.Virus Symantec Dir-II.Dragon
Intended.Virus Symantec MME.Ssr.18364
Intended.Virus Symantec Trivial.33
Intended.Virus Symantec HLLO.NumberOne
Intended.Virus Symantec Implant.6200
Intended.Virus Symantec BackDoor.IRC.Sdbot.332
Intended.Virus Symantec Trojan.DownLoader.5178
Intended.Virus Symantec Win32.IRC.Bot.based
Intended.Virus Symantec Trojan.NtRootKit.40

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.