Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.KillFiles.447 16.02.2006 --- Show
Trojan.KillFiles.448 16.02.2006 --- Show
Trojan.KillFiles.4480 16.02.2006 --- Show
Trojan.KillFiles.449 16.02.2006 --- Show
Trojan.KillFiles.45056 16.02.2006 --- Show
Trojan.KillFiles.451 16.02.2006 --- Show
Trojan.KillFiles.452 16.02.2006 --- Show
Trojan.KillFiles.453 16.02.2006 --- Show
Trojan.KillFiles.454 16.02.2006 --- Show
Trojan.KillFiles.455 16.02.2006 --- Show
Trojan.KillFiles.456 16.02.2006 --- Show
Trojan.KillFiles.4576 16.02.2006 --- Show
Trojan.KillFiles.458 16.02.2006 --- Show
Trojan.KillFiles.459 16.02.2006 --- Show
Trojan.KillFiles.462 16.02.2006 --- Show
Trojan.KillFiles.465 16.02.2006 --- Show
Trojan.KillFiles.467 16.02.2006 --- Show
Trojan.KillFiles.468 16.02.2006 --- Show
Trojan.KillFiles.47 16.02.2006 --- Show
Trojan.KillFiles.470 16.02.2006 --- Show
Trojan.KillFiles.471 16.02.2006 --- Show
Trojan.KillFiles.472 16.02.2006 --- Show
Trojan.KillFiles.4720 16.02.2006 --- Show
Trojan.KillFiles.474 16.02.2006 --- Show
Trojan.KillFiles.475 16.02.2006 --- Show
Trojan.KillFiles.47557 16.02.2006 --- Show
Trojan.KillFiles.476 16.02.2006 --- Show
Trojan.KillFiles.482 16.02.2006 --- Show
Trojan.KillFiles.483 16.02.2006 --- Show
Trojan.KillFiles.484 16.02.2006 --- Show
Trojan.KillFiles.485 16.02.2006 --- Show
Trojan.KillFiles.49152 16.02.2006 --- Show
Trojan.KillFiles.49154 16.02.2006 --- Show
Trojan.KillFiles.50 16.02.2006 --- Show
Trojan.KillFiles.50162 16.02.2006 --- Show
Trojan.KillFiles.5040 16.02.2006 --- Show
Trojan.KillFiles.5056 16.02.2006 --- Show
Trojan.KillFiles.51 16.02.2006 --- Show
Trojan.KillFiles.5136 16.02.2006 --- Show
Trojan.KillFiles.5184 16.02.2006 --- Show
Trojan.KillFiles.52 16.02.2006 --- Show
Trojan.KillFiles.53 16.02.2006 --- Show
Trojan.KillFiles.54 16.02.2006 --- Show
Trojan.KillFiles.540 16.02.2006 --- Show
Trojan.KillFiles.548 16.02.2006 --- Show
Trojan.KillFiles.55 16.02.2006 --- Show
Trojan.KillFiles.559 16.02.2006 --- Show
Trojan.KillFiles.5680 16.02.2006 --- Show
Trojan.KillFiles.57 16.02.2006 --- Show
Trojan.KillFiles.5712 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies