Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader3.24414 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24415 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24425 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24426 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24428 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24438 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24446 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24448 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24453 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24458 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24466 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24467 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24468 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24469 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24470 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24471 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24472 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24473 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24474 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24475 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24476 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24477 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24478 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24479 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24480 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24481 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24482 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24483 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24484 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24485 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24486 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24487 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24488 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24489 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24490 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24491 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24492 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24493 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24494 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24495 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24496 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24497 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24498 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24499 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24500 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24501 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24502 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24503 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24504 14.06.2011 11.06.2011 Show
Trojan.DownLoader3.24505 14.06.2011 11.06.2011 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies