Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.2603 16.02.2006 --- Show
Trojan.DownLoader.2604 16.02.2006 --- Show
Trojan.DownLoader.2605 16.02.2006 --- Show
Trojan.DownLoader.2606 16.02.2006 --- Show
Trojan.DownLoader.2607 16.02.2006 --- Show
Trojan.DownLoader.2609 16.02.2006 --- Show
Trojan.DownLoader.26112 16.02.2006 --- Show
Trojan.DownLoader.2612 16.02.2006 --- Show
Trojan.DownLoader.2614 16.02.2006 --- Show
Trojan.DownLoader.2615 16.02.2006 --- Show
Trojan.DownLoader.2616 16.02.2006 --- Show
Trojan.DownLoader.2617 16.02.2006 --- Show
Trojan.DownLoader.2618 16.02.2006 --- Show
Trojan.DownLoader.2619 16.02.2006 --- Show
Trojan.DownLoader.262 16.02.2006 --- Show
Trojan.DownLoader.2620 16.02.2006 --- Show
Trojan.DownLoader.2621 16.02.2006 --- Show
Trojan.DownLoader.2622 16.02.2006 --- Show
Trojan.DownLoader.2623 16.02.2006 --- Show
Trojan.DownLoader.2624 16.02.2006 --- Show
Trojan.DownLoader.2625 16.02.2006 --- Show
Trojan.DownLoader.2626 16.02.2006 --- Show
Trojan.DownLoader.2627 16.02.2006 --- Show
Trojan.DownLoader.2628 16.02.2006 --- Show
Trojan.DownLoader.2630 16.02.2006 --- Show
Trojan.DownLoader.2632 16.02.2006 --- Show
Trojan.DownLoader.2633 16.02.2006 --- Show
Trojan.DownLoader.2634 16.02.2006 --- Show
Trojan.DownLoader.2635 16.02.2006 --- Show
Trojan.DownLoader.2637 16.02.2006 --- Show
Trojan.DownLoader.2638 16.02.2006 --- Show
Trojan.DownLoader.2639 16.02.2006 --- Show
Trojan.DownLoader.264 16.02.2006 --- Show
Trojan.DownLoader.2640 16.02.2006 --- Show
Trojan.DownLoader.2641 16.02.2006 --- Show
Trojan.DownLoader.2642 16.02.2006 --- Show
Trojan.DownLoader.2643 16.02.2006 --- Show
Trojan.DownLoader.2644 16.02.2006 --- Show
Trojan.DownLoader.2645 16.02.2006 --- Show
Trojan.DownLoader.2647 16.02.2006 --- Show
Trojan.DownLoader.2648 16.02.2006 --- Show
Trojan.DownLoader.2650 16.02.2006 --- Show
Trojan.DownLoader.2652 16.02.2006 --- Show
Trojan.DownLoader.2654 16.02.2006 --- Show
Trojan.DownLoader.2655 16.02.2006 --- Show
Trojan.DownLoader.2656 16.02.2006 --- Show
Trojan.DownLoader.2659 16.02.2006 --- Show
Trojan.DownLoader.2660 16.02.2006 --- Show
Trojan.DownLoader.2661 16.02.2006 --- Show
Trojan.DownLoader.2663 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies