Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.6253 16.02.2006 --- Show
BAT.Girls 16.02.2006 --- Show
BackDoor.Mapy 16.02.2006 --- Show
Trojan.IframeExec 16.02.2006 --- Show
Win32.HLLW.Shared 16.02.2006 --- Show
BackDoor.TB.31 16.02.2006 --- Show
Trojan.Proxy.605 16.02.2006 --- Show
BackDoor.Drm 16.02.2006 --- Show
Trojan.MulDrop.3231 16.02.2006 --- Show
BackDoor.IRC.Sdbot.411 16.02.2006 --- Show
Trojan.DownLoader.6499 16.02.2006 --- Show
Trojan.DownLoader.6294 16.02.2006 --- Show
BackDoor.HackDef.158 16.02.2006 --- Show
Trojan.KeyLogger.370 16.02.2006 --- Show
BackDoor.Horche 16.02.2006 --- Show
BackDoor.Carji 16.02.2006 --- Show
Trojan.MulDrop.3254 16.02.2006 --- Show
Trojan.DownLoader.6368 16.02.2006 --- Show
BackDoor.Nightride 16.02.2006 --- Show
Trojan.AVKill.140 16.02.2006 --- Show
BackDoor.Ghost.25 16.02.2006 --- Show
Trojan.PWS.LDPinch.690 16.02.2006 --- Show
Trojan.DownLoader.5693 16.02.2006 --- Show
BackDoor.Panga 16.02.2006 --- Show
Adware.Zquest 16.02.2006 --- Show
Trojan.DownLoader.6350 16.02.2006 --- Show
BackDoor.Wacz 16.02.2006 --- Show
Trojan.PWS.LDPinch.691 16.02.2006 --- Show
BackDoor.HackDef.159 16.02.2006 --- Show
BackDoor.Nist 16.02.2006 --- Show
Trojan.StartPage.1054 16.02.2006 --- Show
BackDoor.Unilink.8726 16.02.2006 --- Show
Trojan.PWS.Banker.1478 16.02.2006 --- Show
BackDoor.Pigeon.159 16.02.2006 --- Show
Trojan.MulDrop.3262 16.02.2006 --- Show
Trojan.PWS.LDPinch.669 16.02.2006 --- Show
Win32.HLLM.MyDoom.86 16.02.2006 --- Show
Trojan.Isbar.404 16.02.2006 --- Show
Trojan.MulDrop.3211 16.02.2006 --- Show
Trojan.DownLoader.6286 16.02.2006 --- Show
BackDoor.HackDef.157 16.02.2006 --- Show
Trojan.DownLoader.4951 16.02.2006 --- Show
BackDoor.Bucp 16.02.2006 --- Show
Trojan.PWS.Legmir.461 16.02.2006 --- Show
Trojan.NtRootKit.56 16.02.2006 --- Show
Trojan.PWS.Legmir.470 16.02.2006 --- Show
Trojan.DownLoader.6394 16.02.2006 --- Show
BackDoor.Generic.1191 16.02.2006 --- Show
Trojan.PWS.Legmir.449 16.02.2006 --- Show
VBS.Generic.463 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.