Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen31.27440 03:01:26 18.05.2025 Show
Trojan.Inject5.42032 03:01:26 18.05.2025 Show
Trojan.Inject5.42374 03:01:26 18.05.2025 Show
Trojan.Inject5.42393 03:01:26 18.05.2025 Show
Trojan.Inject5.42231 03:01:26 18.05.2025 Show
Trojan.Inject5.42022 03:01:26 18.05.2025 Show
Trojan.Inject5.41849 03:01:26 18.05.2025 Show
Trojan.Inject5.41946 03:01:26 18.05.2025 Show
Trojan.Bladabindi.1946 03:01:26 18.05.2025 Show
Trojan.KillProc2.24512 03:01:25 18.05.2025 Show
Trojan.Inject5.42307 03:01:25 18.05.2025 Show
Trojan.Inject5.41969 03:01:25 18.05.2025 Show
Trojan.Inject5.41815 03:01:25 18.05.2025 Show
Trojan.DownLoader48.40382 03:01:25 18.05.2025 Show
Trojan.Siggen31.27528 03:01:25 18.05.2025 Show
Trojan.MulDrop32.2283 03:01:25 18.05.2025 Show
Trojan.Siggen31.27508 03:01:25 18.05.2025 Show
Trojan.Siggen31.27433 03:01:25 18.05.2025 Show
Trojan.DownLoader48.40365 03:01:25 18.05.2025 Show
Trojan.Inject5.41563 03:01:25 18.05.2025 Show
Trojan.Inject5.41881 03:01:24 18.05.2025 Show
Trojan.Inject5.42382 03:01:24 18.05.2025 Show
Trojan.Inject5.42389 03:01:24 18.05.2025 Show
Trojan.MulDrop32.2364 03:01:24 18.05.2025 Show
Trojan.Siggen31.27476 03:01:24 18.05.2025 Show
Trojan.Inject5.42205 03:01:24 18.05.2025 Show
Trojan.Siggen31.27410 03:01:24 18.05.2025 Show
Trojan.Inject5.42094 03:01:24 18.05.2025 Show
Trojan.Inject5.42162 03:01:24 18.05.2025 Show
Trojan.Inject5.41782 03:01:24 18.05.2025 Show
Trojan.Inject5.41944 03:01:23 18.05.2025 Show
Trojan.Inject5.41821 03:01:23 18.05.2025 Show
Trojan.Inject5.41733 03:01:23 18.05.2025 Show
Trojan.Inject5.42243 03:01:23 18.05.2025 Show
Trojan.MulDrop32.2233 03:01:23 18.05.2025 Show
Trojan.Siggen31.27539 03:01:23 18.05.2025 Show
Trojan.Inject5.42354 03:01:23 18.05.2025 Show
Trojan.Inject5.41903 03:01:23 18.05.2025 Show
Trojan.Siggen31.27507 03:01:22 18.05.2025 Show
Trojan.Inject5.42126 03:01:22 18.05.2025 Show
Trojan.Inject5.41955 03:01:22 18.05.2025 Show
Trojan.Siggen31.27575 03:01:22 18.05.2025 Show
Trojan.MulDrop32.2184 03:01:22 18.05.2025 Show
Trojan.MulDrop32.2198 03:01:22 18.05.2025 Show
Trojan.Siggen31.27498 03:01:22 18.05.2025 Show
Trojan.DownLoader48.40422 03:01:22 18.05.2025 Show
Trojan.Inject5.41873 03:01:22 18.05.2025 Show
Trojan.Inject5.42074 03:01:22 18.05.2025 Show
Trojan.Inject5.42187 03:01:22 18.05.2025 Show
Trojan.Inject5.41910 03:01:22 18.05.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.