FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Proxy.404 17.02.2006 --- Show
Trojan.Proxy.413 17.02.2006 --- Show
Trojan.Proxy.425 17.02.2006 --- Show
Trojan.Proxy.434 17.02.2006 --- Show
Trojan.Proxy.441 17.02.2006 --- Show
Trojan.Proxy.442 17.02.2006 --- Show
Trojan.Proxy.450 17.02.2006 --- Show
Trojan.Proxy.453 17.02.2006 --- Show
Trojan.Proxy.458 17.02.2006 --- Show
Trojan.Proxy.459 17.02.2006 --- Show
Trojan.Proxy.460 17.02.2006 --- Show
Trojan.Proxy.476 17.02.2006 --- Show
Trojan.Proxy.482 17.02.2006 --- Show
Trojan.Proxy.492 17.02.2006 --- Show
Trojan.Proxy.524 17.02.2006 --- Show
Trojan.Proxy.528 17.02.2006 --- Show
Trojan.Proxy.536 17.02.2006 --- Show
Trojan.Proxy.543 17.02.2006 --- Show
Trojan.Proxy.549 17.02.2006 --- Show
Trojan.Proxy.554 17.02.2006 --- Show
Trojan.Proxy.557 17.02.2006 --- Show
Trojan.Proxy.559 17.02.2006 --- Show
Trojan.Proxy.57 17.02.2006 --- Show
Trojan.Proxy.576 17.02.2006 --- Show
Trojan.Proxy.580 17.02.2006 --- Show
Trojan.Proxy.582 17.02.2006 --- Show
Trojan.Proxy.584 17.02.2006 --- Show
Trojan.Proxy.598 17.02.2006 --- Show
Trojan.Proxy.615 17.02.2006 --- Show
Trojan.Proxy.627 17.02.2006 --- Show
Trojan.Proxy.633 17.02.2006 --- Show
Trojan.Proxy.636 17.02.2006 --- Show
Trojan.Proxy.68 17.02.2006 --- Show
Trojan.Proxy.69 17.02.2006 --- Show
Trojan.Proxy.71 17.02.2006 --- Show
Trojan.Proxy.82 17.02.2006 --- Show
Trojan.Prute 17.02.2006 --- Show
Trojan.PWS.ABC 17.02.2006 --- Show
Trojan.PWS.Ahne 17.02.2006 --- Show
Trojan.PWS.Antigen 17.02.2006 --- Show
Trojan.PWS.Aolek 17.02.2006 --- Show
Trojan.PWS.Arj 17.02.2006 --- Show
Trojan.PWS.Balance 17.02.2006 --- Show
Trojan.PWS.Bancos.206 17.02.2006 --- Show
Trojan.PWS.Bancos.78 17.02.2006 --- Show
Trojan.PWS.Banker.1031 17.02.2006 --- Show
Trojan.PWS.Banker.1051 17.02.2006 --- Show
Trojan.PWS.Banker.1068 17.02.2006 --- Show
Trojan.PWS.Banker.1185 17.02.2006 --- Show
Trojan.PWS.Banker.1188 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies