Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.10953 18.07.2006 --- Show
Trojan.DownLoader.10954 18.07.2006 --- Show
Trojan.DownLoader.10955 18.07.2006 --- Show
Trojan.DownLoader.10956 18.07.2006 --- Show
Trojan.DownLoader.10958 18.07.2006 --- Show
Trojan.DownLoader.10960 18.07.2006 --- Show
Trojan.DownLoader.10961 18.07.2006 --- Show
Trojan.DownLoader.10962 18.07.2006 --- Show
Trojan.DownLoader.9662 18.07.2006 --- Show
Trojan.MulDrop.3961 18.07.2006 --- Show
Trojan.MulDrop.3963 18.07.2006 --- Show
Trojan.NtRootKit.138 18.07.2006 --- Show
Trojan.PWS.Banker.4047 18.07.2006 --- Show
Trojan.PWS.Banker.4048 18.07.2006 --- Show
Trojan.PWS.Banker.4049 18.07.2006 --- Show
Trojan.PWS.Banker.4050 18.07.2006 --- Show
Trojan.PWS.Banker.4052 18.07.2006 --- Show
Trojan.PWS.Banker.4053 18.07.2006 --- Show
Trojan.PWS.Banker.4054 18.07.2006 --- Show
Trojan.PWS.Banker.4055 18.07.2006 --- Show
Trojan.PWS.Banker.4056 18.07.2006 --- Show
Trojan.PWS.Banker.4057 18.07.2006 --- Show
Trojan.PWS.LDPinch.1028 18.07.2006 --- Show
Trojan.PWS.LDPinch.1029 18.07.2006 --- Show
Trojan.PWS.LDPinch.1030 18.07.2006 --- Show
Trojan.PWS.LDPinch.1031 18.07.2006 --- Show
Trojan.PWS.Legmir.164 18.07.2006 --- Show
Trojan.PWS.Legmir.388 18.07.2006 --- Show
Trojan.QQLove 18.07.2006 --- Show
Trojan.Starter.65 18.07.2006 --- Show
VBS.Peneluta 18.07.2006 --- Show
Win32.HLLM.Beagle.19802 18.07.2006 04.02.2006 Show
Win32.HLLM.MyDoom.49 18.07.2006 --- Show
Win32.HLLM.MyDoom.Log 18.07.2006 07.09.2004 Show
Win32.HLLW.Cribe 18.07.2006 --- Show
Win32.HLLW.Ircer 18.07.2006 --- Show
Win32.HLLW.Tamiami 18.07.2006 --- Show
BackDoor.IRC.Sdbot.704 17.07.2006 --- Show
BackDoor.Iroffer.1274 17.07.2006 --- Show
BackDoor.Pigeon.189 17.07.2006 --- Show
BackDoor.Pigeon.350 17.07.2006 --- Show
BackDoor.Pigeon.351 17.07.2006 --- Show
BackDoor.Pigeon.352 17.07.2006 --- Show
BackDoor.Pigeon.353 17.07.2006 --- Show
Tool.Jacker 17.07.2006 --- Show
Trojan.Click.1289 17.07.2006 --- Show
Trojan.DownLoader.10932 17.07.2006 --- Show
Trojan.DownLoader.10933 17.07.2006 --- Show
Trojan.DownLoader.10934 17.07.2006 --- Show
Trojan.DownLoader.10935 17.07.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies