FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.LDPinch.1089 12.08.2006 --- Show
Trojan.PWS.LDPinch.1090 12.08.2006 --- Show
Trojan.PWS.Legmir.543 12.08.2006 --- Show
Trojan.PWS.QQGhost 12.08.2006 --- Show
Trojan.PWS.Qqrobber.122 12.08.2006 --- Show
Trojan.Wschooler 12.08.2006 --- Show
BackDoor.Assasin.20 11.08.2006 --- Show
BackDoor.Tiny.31 11.08.2006 --- Show
Trojan.Click.1290 11.08.2006 --- Show
Trojan.Click.1361 11.08.2006 --- Show
Trojan.Click.1362 11.08.2006 --- Show
Trojan.DownLoader.10908 11.08.2006 --- Show
Trojan.DownLoader.11719 11.08.2006 --- Show
Trojan.DownLoader.11955 11.08.2006 --- Show
Trojan.DownLoader.11966 11.08.2006 --- Show
Trojan.DownLoader.11967 11.08.2006 --- Show
Trojan.DownLoader.11968 11.08.2006 --- Show
Trojan.DownLoader.11979 11.08.2006 --- Show
Trojan.DownLoader.11982 11.08.2006 --- Show
Trojan.DownLoader.11983 11.08.2006 --- Show
Trojan.DownLoader.11984 11.08.2006 --- Show
Trojan.DownLoader.11985 11.08.2006 --- Show
Trojan.DownLoader.11986 11.08.2006 --- Show
Trojan.DownLoader.11988 11.08.2006 --- Show
Trojan.DownLoader.11989 11.08.2006 --- Show
Trojan.DownLoader.11991 11.08.2006 --- Show
Trojan.DownLoader.11992 11.08.2006 --- Show
Trojan.DownLoader.11993 11.08.2006 --- Show
Trojan.DownLoader.11995 11.08.2006 --- Show
Trojan.DownLoader.11996 11.08.2006 --- Show
Trojan.DownLoader.11998 11.08.2006 --- Show
Trojan.DownLoader.11999 11.08.2006 --- Show
Trojan.DownLoader.12000 11.08.2006 --- Show
Trojan.DownLoader.12001 11.08.2006 --- Show
Trojan.DownLoader.12002 11.08.2006 --- Show
Trojan.DownLoader.12003 11.08.2006 --- Show
Trojan.DownLoader.12004 11.08.2006 --- Show
Trojan.DownLoader.12006 11.08.2006 --- Show
Trojan.DownLoader.12008 11.08.2006 --- Show
Trojan.DownLoader.12009 11.08.2006 --- Show
Trojan.DownLoader.12010 11.08.2006 --- Show
Trojan.DownLoader.12011 11.08.2006 --- Show
Trojan.DownLoader.12012 11.08.2006 --- Show
Trojan.DownLoader.12013 11.08.2006 --- Show
Trojan.DownLoader.12014 11.08.2006 --- Show
Trojan.Hooker.121 11.08.2006 --- Show
Trojan.KeyLogger.182 11.08.2006 --- Show
Trojan.MulDrop.4049 11.08.2006 --- Show
Trojan.MulDrop.4078 11.08.2006 --- Show
Trojan.MulDrop.4079 11.08.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies