FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Click.1725 24.11.2006 --- Show
Trojan.DownLoader.14849 24.11.2006 --- Show
Trojan.DownLoader.14880 24.11.2006 --- Show
Trojan.DownLoader.14907 24.11.2006 --- Show
Trojan.DownLoader.15164 24.11.2006 --- Show
Trojan.DownLoader.15165 24.11.2006 --- Show
Trojan.DownLoader.15166 24.11.2006 --- Show
Trojan.DownLoader.15167 24.11.2006 --- Show
Trojan.DownLoader.15169 24.11.2006 --- Show
Trojan.DownLoader.15175 24.11.2006 --- Show
Trojan.DownLoader.15177 24.11.2006 --- Show
Trojan.DownLoader.15178 24.11.2006 --- Show
Trojan.DownLoader.15179 24.11.2006 --- Show
Trojan.DownLoader.15181 24.11.2006 --- Show
Trojan.DownLoader.15183 24.11.2006 --- Show
Trojan.DownLoader.15184 24.11.2006 --- Show
Trojan.DownLoader.15185 24.11.2006 --- Show
Trojan.DownLoader.15187 24.11.2006 --- Show
Trojan.DownLoader.15189 24.11.2006 --- Show
Trojan.DownLoader.15190 24.11.2006 --- Show
Trojan.DownLoader.15193 24.11.2006 --- Show
Trojan.DownLoader.15194 24.11.2006 --- Show
Trojan.DownLoader.15195 24.11.2006 --- Show
Trojan.DownLoader.15196 24.11.2006 --- Show
Trojan.DownLoader.15197 24.11.2006 --- Show
Trojan.DownLoader.15198 24.11.2006 --- Show
Trojan.DownLoader.15199 24.11.2006 --- Show
Trojan.DownLoader.15201 24.11.2006 --- Show
Trojan.DownLoader.15203 24.11.2006 --- Show
Trojan.KeyLogger.691 24.11.2006 --- Show
Trojan.MulDrop.4377 24.11.2006 --- Show
Trojan.MulDrop.4543 24.11.2006 --- Show
Trojan.MulDrop.4595 24.11.2006 --- Show
Trojan.Proxy.1225 24.11.2006 --- Show
Trojan.Proxy.1228 24.11.2006 --- Show
Trojan.Proxy.1229 24.11.2006 --- Show
Trojan.Proxy.1230 24.11.2006 --- Show
Trojan.Proxy.1231 24.11.2006 --- Show
Trojan.Proxy.1232 24.11.2006 --- Show
Trojan.Proxy.1233 24.11.2006 --- Show
Trojan.Proxy.1234 24.11.2006 --- Show
Trojan.Proxy.1235 24.11.2006 --- Show
Trojan.Proxy.1236 24.11.2006 --- Show
Trojan.Proxy.1237 24.11.2006 --- Show
Trojan.Proxy.1238 24.11.2006 --- Show
Trojan.PWS.Banker.5768 24.11.2006 --- Show
Trojan.PWS.Centaur 24.11.2006 --- Show
Trojan.PWS.LDPinch.1316 24.11.2006 --- Show
Trojan.PWS.Qqpass.279 24.11.2006 --- Show
Trojan.SpyTec 24.11.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies