Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Proxy-Piky aliases:

Name Vendor Dr.Web classification name
Proxy-Piky McAfee Trojan.Proxy.715
Proxy-Piky McAfee Trojan.Proxy.391
Proxy-Piky McAfee Trojan.Proxy.414
Proxy-Piky McAfee BackDoor.Spooler
Proxy-Piky McAfee Trojan.Proxy.110
Proxy-Piky McAfee Trojan.Proxy.173
Proxy-Piky McAfee Trojan.Proxy.420
Proxy-Piky McAfee Trojan.Proxy.151
Proxy-Piky McAfee Trojan.Proxy.141
Proxy-Piky McAfee Trojan.Proxy.138
Proxy-Piky McAfee Trojan.Proxy.347
Proxy-Piky McAfee Trojan.Proxy.184
Proxy-Piky McAfee Trojan.Proxy.455
Proxy-Piky McAfee Trojan.Proxy.448
Proxy-Piky McAfee Trojan.Proxy.238
Proxy-Piky McAfee Trojan.Ranky
Proxy-Piky McAfee Trojan.Proxy
Proxy-Piky McAfee BackDoor.HackDef.106
Proxy-Piky McAfee Trojan.Ranky.40454
Proxy-Piky McAfee BackDoor.Ian
Proxy-Piky McAfee BackDoor.DarkMoon.66
Proxy-Piky McAfee Trojan.Proxy.640
Proxy-Piky McAfee Trojan.Proxy.761
Proxy-Piky McAfee Trojan.Proxy.668
Proxy-Piky McAfee Trojan.Proxy.895
Proxy-Piky McAfee Trojan.Proxy.975
Proxy-Piky McAfee Trojan.Proxy.1077
Proxy-Piky McAfee Trojan.Proxy.1338
Proxy-Piky McAfee Trojan.DownLoader.19436
Proxy-Piky McAfee Trojan.DownLoader.19495
Proxy-Piky McAfee Trojan.DownLoader.19425
Proxy-Piky McAfee Trojan.Haxx
Proxy-Piky McAfee Trojan.Proxy.1001
Proxy-Piky McAfee Trojan.DownLoader.45885
Proxy-Piky McAfee Trojan.DownLoader.22134
Proxy-Piky McAfee Trojan.Proxy.2497
Proxy-Piky McAfee DDoS.BEnergy
Proxy-Piky McAfee Trojan.Click.16939
Proxy-Piky McAfee Trojan.Proxy.2751
Proxy-Piky McAfee Trojan.DownLoader.22178
Proxy-Piky McAfee Trojan.Proxy.874
Proxy-Piky McAfee Trojan.Proxy.2655
Proxy-Piky McAfee BackDoor.Inasp
Proxy-Piky McAfee Trojan.Proxy.931
Proxy-Piky McAfee Trojan.Proxy.3152
Proxy-Piky McAfee BackDoor.Dax
Proxy-Piky McAfee Trojan.Proxy.805
Proxy-Piky McAfee Trojan.Proxy.929
Proxy-Piky McAfee Trojan.Proxy.2871
Proxy-Piky McAfee Trojan.Proxy.2277

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.