FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader45.21268 00:20:24 02.10.2022 Show
Win32.HLLW.Autoruner3.5753 00:20:23 02.10.2022 Show
Trojan.MulDrop20.60829 00:20:21 02.10.2022 Show
Trojan.Siggen18.53130 00:20:19 02.10.2022 Show
Win32.HLLW.Autoruner3.5778 00:20:18 02.10.2022 Show
Trojan.Siggen18.52836 00:20:16 02.10.2022 Show
Win32.HLLW.Autoruner3.5759 00:20:16 02.10.2022 Show
Trojan.MulDrop20.60682 00:20:16 02.10.2022 Show
Trojan.Siggen18.52937 00:20:15 02.10.2022 Show
Trojan.DownLoader45.21230 00:20:13 02.10.2022 Show
Trojan.Siggen18.52840 00:20:13 02.10.2022 Show
Trojan.Siggen18.53412 00:20:12 02.10.2022 Show
Trojan.MulDrop20.60732 00:20:11 02.10.2022 Show
Trojan.MulDrop20.60758 00:20:10 02.10.2022 Show
Trojan.DownLoader45.21367 00:20:10 02.10.2022 Show
Trojan.MulDrop20.60779 00:20:10 02.10.2022 Show
Trojan.KillProc2.18602 00:20:07 02.10.2022 Show
Trojan.Encoder.35974 00:20:06 02.10.2022 Show
Trojan.PWS.Siggen3.22832 00:20:06 02.10.2022 Show
Trojan.MulDrop20.60786 00:20:04 02.10.2022 Show
Trojan.MulDrop20.60856 00:20:00 02.10.2022 Show
Trojan.Siggen18.53422 00:20:00 02.10.2022 Show
Trojan.DownLoader45.21265 00:20:00 02.10.2022 Show
Trojan.Siggen18.52862 00:19:59 02.10.2022 Show
Trojan.MulDrop20.60700 00:19:58 02.10.2022 Show
Trojan.MulDrop20.60734 00:19:57 02.10.2022 Show
Trojan.MulDrop20.60650 00:19:57 02.10.2022 Show
Trojan.MulDrop20.60563 00:19:57 02.10.2022 Show
Trojan.MulDrop20.60647 00:19:56 02.10.2022 Show
Trojan.MulDrop20.60871 00:19:55 02.10.2022 Show
Trojan.DownLoader45.21408 00:19:53 02.10.2022 Show
Trojan.Siggen18.52901 00:19:52 02.10.2022 Show
Trojan.MulDrop20.60661 00:19:52 02.10.2022 Show
Trojan.Siggen18.52841 00:19:51 02.10.2022 Show
Trojan.MulDrop20.60573 00:19:50 02.10.2022 Show
Trojan.MulDrop20.60742 00:19:49 02.10.2022 Show
Trojan.MulDrop20.60766 00:19:49 02.10.2022 Show
Trojan.Siggen18.52834 00:19:47 02.10.2022 Show
Trojan.DownLoader45.21196 00:19:46 02.10.2022 Show
Trojan.DownLoader45.21306 00:19:46 02.10.2022 Show
Trojan.DownLoader45.21229 00:19:44 02.10.2022 Show
Trojan.Inject4.44229 00:19:44 02.10.2022 Show
Trojan.MulDrop20.61013 00:19:42 02.10.2022 Show
Trojan.MulDrop20.60808 00:19:40 02.10.2022 Show
Trojan.DownLoader45.21496 00:19:39 02.10.2022 Show
Trojan.Siggen18.53041 00:19:38 02.10.2022 Show
Trojan.Inject4.44225 00:19:36 02.10.2022 Show
Trojan.Siggen18.52948 00:19:36 02.10.2022 Show
Trojan.Hosts.50500 00:19:33 02.10.2022 Show
Trojan.MulDrop20.60969 00:19:32 02.10.2022 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies