Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_Virus aliases:

Name Vendor Dr.Web classification name
Possible_Virus Trend Micro Win95.Dedo.1365
Possible_Virus Trend Micro Win95.Smash.4096
Possible_Virus Trend Micro Win95.Smash.2266
Possible_Virus Trend Micro Win95.Sexy.256
Possible_Virus Trend Micro Win32.Belcebu.1445
Possible_Virus Trend Micro Win95.Craddle.1024
Possible_Virus Trend Micro Win95.Etymo.1336
Possible_Virus Trend Micro Win95.CIH.1054
Possible_Virus Trend Micro Win95.CIH.1003
Possible_Virus Trend Micro Win95.Bonk.1232
Possible_Virus Trend Micro BackDoor.Y3krat.18
Possible_Virus Trend Micro Win32.HLLM.Valentine
Possible_Virus Trend Micro Win32.HLLW.Xoxo
Possible_Virus Trend Micro Win32.HLLW.Romeo.34304
Possible_Virus Trend Micro Trojan.DownLoader.1455
Possible_Virus Trend Micro Trojan.DownLoader.1155
Possible_Virus Trend Micro Trojan.DownLoader.1019
Possible_Virus Trend Micro Trojan.FCbind
Possible_Virus Trend Micro BackDoor.Erazer.10
Possible_Virus Trend Micro BackDoor.Erazer.11
Possible_Virus Trend Micro BackDoor.Gezi
Possible_Virus Trend Micro Exploit.DCom.50
Possible_Virus Trend Micro Trojan.DownLoader.5472
Possible_Virus Trend Micro Trojan.StartPage.1053
Possible_Virus Trend Micro Trojan.StartPage.1074
Possible_Virus Trend Micro Trojan.DownLoader.5273
Possible_Virus Trend Micro Trojan.StartPage.1116
Possible_Virus Trend Micro Trojan.DownLoader.1786
Possible_Virus Trend Micro Trojan.DownLoader.1223
Possible_Virus Trend Micro Trojan.DownLoader.1539
Possible_Virus Trend Micro Trojan.DownLoader.3890
Possible_Virus Trend Micro Trojan.DownLoader.3793
Possible_Virus Trend Micro Trojan.DownLoader.5952
Possible_Virus Trend Micro Trojan.DownLoader.5312
Possible_Virus Trend Micro Trojan.DownLoader.3727
Possible_Virus Trend Micro Trojan.DownLoader.5383
Possible_Virus Trend Micro Trojan.DownLoader.3127
Possible_Virus Trend Micro Trojan.DownLoader.4574
Possible_Virus Trend Micro Trojan.DownLoader.3748
Possible_Virus Trend Micro Trojan.DownLoader.4026
Possible_Virus Trend Micro Trojan.PWS.Banker.818
Possible_Virus Trend Micro Trojan.Pursuit
Possible_Virus Trend Micro BackDoor.IRC.Morda
Possible_Virus Trend Micro Trojan.DownLoader.2729
Possible_Virus Trend Micro Trojan.DownLoader.3461
Possible_Virus Trend Micro Trojan.DownLoader.1380
Possible_Virus Trend Micro BackDoor.IRC.Distro
Possible_Virus Trend Micro Trojan.PWS.PudoRat
Possible_Virus Trend Micro Trojan.PWS.Banker.944
Possible_Virus Trend Micro Trojan.StartPage.364

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.