Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader49.11892 03:01:23 09.11.2025 Show
Trojan.MulDrop33.41431 03:01:23 09.11.2025 Show
Trojan.MulDrop33.41664 03:01:23 09.11.2025 Show
Trojan.MulDrop33.40992 03:01:23 09.11.2025 Show
Trojan.Encoder.43593 03:01:23 09.11.2025 Show
Trojan.MulDrop33.41752 03:01:23 09.11.2025 Show
Trojan.Inject6.14027 03:01:23 09.11.2025 Show
Trojan.MulDrop33.40833 03:01:23 09.11.2025 Show
Trojan.MulDrop33.40966 03:01:23 09.11.2025 Show
Trojan.Inject6.14095 03:01:22 09.11.2025 Show
Trojan.Siggen32.6145 03:01:22 09.11.2025 Show
Trojan.DownLoader49.11971 03:01:22 09.11.2025 Show
Trojan.Siggen32.6205 03:01:22 09.11.2025 Show
Trojan.MulDrop33.40982 03:01:22 09.11.2025 Show
Trojan.MulDrop33.41117 03:01:22 09.11.2025 Show
Trojan.MulDrop33.41153 03:01:22 09.11.2025 Show
Trojan.DownLoader49.11976 03:01:22 09.11.2025 Show
Trojan.MulDrop33.41699 03:01:22 09.11.2025 Show
Trojan.MulDrop33.41365 03:01:22 09.11.2025 Show
Trojan.Siggen32.6093 03:01:22 09.11.2025 Show
Trojan.DownLoader49.11830 03:01:22 09.11.2025 Show
Trojan.MulDrop33.41420 03:01:22 09.11.2025 Show
Trojan.DownLoader49.11981 03:01:22 09.11.2025 Show
Trojan.MulDrop33.41535 03:01:21 09.11.2025 Show
Trojan.MulDrop33.41549 03:01:21 09.11.2025 Show
Trojan.MulDrop33.41221 03:01:21 09.11.2025 Show
Trojan.MulDrop33.40851 03:01:21 09.11.2025 Show
Trojan.MulDrop33.40899 03:01:21 09.11.2025 Show
Trojan.MulDrop33.41268 03:01:21 09.11.2025 Show
Trojan.Inject6.13983 03:01:21 09.11.2025 Show
Trojan.MulDrop33.41802 03:01:21 09.11.2025 Show
Trojan.MulDrop33.41401 03:01:21 09.11.2025 Show
Trojan.MulDrop33.41148 03:01:21 09.11.2025 Show
Trojan.DownLoader49.12006 03:01:21 09.11.2025 Show
Trojan.DownLoader49.12058 03:01:21 09.11.2025 Show
Trojan.Inject6.13993 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41380 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41594 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41324 03:01:20 09.11.2025 Show
Trojan.DownLoader49.12018 03:01:20 09.11.2025 Show
Trojan.Inject6.14082 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41707 03:01:20 09.11.2025 Show
Trojan.Siggen32.6080 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41029 03:01:20 09.11.2025 Show
Trojan.Siggen32.6124 03:01:20 09.11.2025 Show
Trojan.Inject6.14044 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41297 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41516 03:01:20 09.11.2025 Show
Trojan.MulDrop33.41157 03:01:19 09.11.2025 Show
Trojan.Inject6.14162 03:01:19 09.11.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.