Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Virus.Win32.Induc.c aliases:

Name Vendor Dr.Web classification name
Virus.Win32.Induc.c VirusBlokAda Trojan.Dxbot.2
Virus.Win32.Induc.c VirusBlokAda Trojan.Click.26275
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Yahoo.13
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.22359
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pushnik
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Banker.based
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.40071
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Banker.29582
Virus.Win32.Induc.c VirusBlokAda Trojan.EmailSpy.222
Virus.Win32.Induc.c VirusBlokAda Program.HiddenAdmin.4
Virus.Win32.Induc.c VirusBlokAda Trojan.Winlock.203
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Orkut.119
Virus.Win32.Induc.c VirusBlokAda Win32.Induc
Virus.Win32.Induc.c VirusBlokAda BackDoor.Zhen.34
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.40138
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.38128
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.43997
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.40150
Virus.Win32.Induc.c VirusBlokAda BackDoor.BlackHole.3348
Virus.Win32.Induc.c VirusBlokAda FDOS.IcqFlood.42
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Banker.origin
Virus.Win32.Induc.c VirusBlokAda BackDoor.Zhen.22
Virus.Win32.Induc.c VirusBlokAda BackDoor.Zhen.4
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.22432
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Banker
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Multi.57
Virus.Win32.Induc.c VirusBlokAda BackDoor.Siggen.921
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.22399
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Fakemsn.63
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.23655
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.40328
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Banker.28509
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.38257
Virus.Win32.Induc.c Kaspersky Trojan.Blackmailer.1464
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Banker.28977
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.22244
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Gamania.19036
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.38261
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.origin
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.22423
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.38127
Virus.Win32.Induc.c VirusBlokAda Trojan.PWS.Banker.29118
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.38161
Virus.Win32.Induc.c VirusBlokAda BackDoor.Zhen.16
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.22412
Virus.Win32.Induc.c VirusBlokAda Trojan.DownLoad.38415
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.22398
Virus.Win32.Induc.c VirusBlokAda Trojan.Commer.24
Virus.Win32.Induc.c VirusBlokAda BackDoor.Zhen.17
Virus.Win32.Induc.c VirusBlokAda BackDoor.Pigeon.24221

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.