Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader48.64916 03:03:54 14.09.2025 Show
Trojan.MulDrop32.44682 03:03:54 14.09.2025 Show
Trojan.MulDrop32.43424 03:03:54 14.09.2025 Show
Trojan.MulDrop32.44727 03:03:53 14.09.2025 Show
Trojan.Inject6.2174 03:03:53 14.09.2025 Show
Trojan.MulDrop32.44385 03:03:51 14.09.2025 Show
Trojan.MulDrop32.44575 03:03:51 14.09.2025 Show
Trojan.MulDrop32.44042 03:03:51 14.09.2025 Show
Trojan.MulDrop32.44386 03:03:51 14.09.2025 Show
Trojan.MulDrop32.44420 03:03:51 14.09.2025 Show
Trojan.DownLoader48.64883 03:03:51 14.09.2025 Show
Trojan.Siggen31.55732 03:03:51 14.09.2025 Show
Trojan.MulDrop32.44417 03:03:51 14.09.2025 Show
Trojan.MulDrop32.44218 03:03:51 14.09.2025 Show
Trojan.MulDrop32.44115 03:03:50 14.09.2025 Show
Trojan.Siggen31.55747 03:03:50 14.09.2025 Show
Trojan.Inject6.2169 03:03:50 14.09.2025 Show
Trojan.MulDrop32.44305 03:03:50 14.09.2025 Show
Trojan.Siggen31.55781 03:03:50 14.09.2025 Show
Trojan.DownLoader48.64893 03:03:49 14.09.2025 Show
Trojan.MulDrop32.44287 03:03:49 14.09.2025 Show
Trojan.MulDrop32.44467 03:03:49 14.09.2025 Show
Trojan.MulDrop32.43935 03:03:49 14.09.2025 Show
Trojan.Siggen31.55839 03:03:49 14.09.2025 Show
Trojan.DownLoader48.64898 03:03:49 14.09.2025 Show
Trojan.MulDrop32.43420 03:03:49 14.09.2025 Show
Trojan.PWS.Stealer.43158 03:03:49 14.09.2025 Show
Trojan.Siggen31.55790 03:03:49 14.09.2025 Show
Trojan.DownLoader48.64885 03:03:48 14.09.2025 Show
Trojan.MulDrop32.44014 03:03:48 14.09.2025 Show
Trojan.BankBot.1469 03:03:48 14.09.2025 Show
Trojan.MulDrop32.44493 03:03:48 14.09.2025 Show
Trojan.Siggen31.55769 03:03:48 14.09.2025 Show
Trojan.Siggen31.55729 03:03:48 14.09.2025 Show
Trojan.MulDrop32.44223 03:03:48 14.09.2025 Show
Trojan.MulDrop32.44206 03:03:46 14.09.2025 Show
Trojan.MulDrop32.44344 03:03:46 14.09.2025 Show
Trojan.Inject6.2231 03:03:46 14.09.2025 Show
Trojan.MulDrop32.43953 03:03:46 14.09.2025 Show
Trojan.MulDrop32.43927 03:03:46 14.09.2025 Show
Trojan.MulDrop32.44181 03:03:45 14.09.2025 Show
Trojan.MulDrop32.44732 03:03:45 14.09.2025 Show
Trojan.MulDrop32.43966 03:03:44 14.09.2025 Show
Trojan.MulDrop32.44492 03:03:44 14.09.2025 Show
Trojan.MulDrop32.44779 03:03:44 14.09.2025 Show
Trojan.MulDrop32.44140 03:03:44 14.09.2025 Show
Trojan.MulDrop32.44716 03:03:44 14.09.2025 Show
Trojan.MulDrop32.44257 03:03:43 14.09.2025 Show
Trojan.MulDrop32.44678 03:03:43 14.09.2025 Show
Trojan.Siggen31.55723 03:03:43 14.09.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.