Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop33.13557 03:04:40 20.10.2025 Show
Trojan.Inject6.8304 03:04:40 20.10.2025 Show
Trojan.MulDrop33.12885 03:04:40 20.10.2025 Show
Trojan.DownLoader49.6086 03:04:40 20.10.2025 Show
Trojan.Inject6.7816 03:04:40 20.10.2025 Show
Trojan.MulDrop33.12595 03:04:40 20.10.2025 Show
Trojan.Siggen31.64578 03:04:39 20.10.2025 Show
Trojan.MulDrop33.13496 03:04:39 20.10.2025 Show
Trojan.MulDrop33.13393 03:04:38 20.10.2025 Show
Trojan.MulDrop33.12635 03:04:37 20.10.2025 Show
Trojan.MulDrop33.12676 03:04:37 20.10.2025 Show
Trojan.DownLoader49.6164 03:04:37 20.10.2025 Show
Trojan.DownLoader49.6172 03:04:37 20.10.2025 Show
Trojan.Inject6.7902 03:04:37 20.10.2025 Show
Trojan.MulDrop33.12629 03:04:37 20.10.2025 Show
Trojan.Inject6.7665 03:04:37 20.10.2025 Show
Trojan.DownLoader49.5935 03:04:37 20.10.2025 Show
Trojan.Inject6.7662 03:04:36 20.10.2025 Show
Trojan.Siggen31.64459 03:04:36 20.10.2025 Show
Trojan.DownLoader49.6150 03:04:36 20.10.2025 Show
Trojan.Inject6.7744 03:04:36 20.10.2025 Show
Trojan.DownLoader49.6251 03:04:36 20.10.2025 Show
Trojan.MulDrop33.13082 03:04:36 20.10.2025 Show
Trojan.Inject6.7949 03:04:36 20.10.2025 Show
Trojan.MulDrop33.12896 03:04:35 20.10.2025 Show
Trojan.Siggen31.64501 03:04:35 20.10.2025 Show
Trojan.Inject6.7986 03:04:35 20.10.2025 Show
Trojan.Siggen31.64573 03:04:35 20.10.2025 Show
Trojan.Siggen31.64485 03:04:35 20.10.2025 Show
Trojan.Inject6.7891 03:04:35 20.10.2025 Show
Trojan.Siggen31.64441 03:04:35 20.10.2025 Show
Trojan.MulDrop33.12704 03:04:35 20.10.2025 Show
Trojan.DownLoader49.5929 03:04:35 20.10.2025 Show
Trojan.MulDrop33.15114 03:04:34 20.10.2025 Show
Trojan.DownLoader49.6222 03:04:34 20.10.2025 Show
Trojan.MulDrop33.13799 03:04:34 20.10.2025 Show
Trojan.MulDrop33.12849 03:04:34 20.10.2025 Show
Trojan.Siggen31.64435 03:04:33 20.10.2025 Show
Trojan.Inject6.7810 03:04:33 20.10.2025 Show
Trojan.MulDrop33.13628 03:04:33 20.10.2025 Show
Trojan.MulDrop33.13198 03:04:33 20.10.2025 Show
Trojan.DownLoader49.6179 03:04:33 20.10.2025 Show
Trojan.DownLoader49.6111 03:04:33 20.10.2025 Show
Trojan.MulDrop33.13723 03:04:33 20.10.2025 Show
Trojan.DownLoader49.6410 03:04:33 20.10.2025 Show
Trojan.Siggen31.64881 03:04:33 20.10.2025 Show
Trojan.MulDrop33.12653 03:04:32 20.10.2025 Show
Trojan.MulDrop33.13648 03:04:32 20.10.2025 Show
Trojan.Siggen31.64816 03:04:32 20.10.2025 Show
Trojan.Siggen31.64781 03:04:32 20.10.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.