Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop32.44716 03:03:44 14.09.2025 Show
Trojan.MulDrop32.44257 03:03:43 14.09.2025 Show
Trojan.MulDrop32.44678 03:03:43 14.09.2025 Show
Trojan.Siggen31.55723 03:03:43 14.09.2025 Show
Trojan.Siggen31.55840 03:03:42 14.09.2025 Show
Trojan.Packed2.50186 03:03:42 14.09.2025 Show
Trojan.MulDrop32.44114 03:03:42 14.09.2025 Show
Trojan.MulDrop32.44772 03:03:42 14.09.2025 Show
Trojan.MulDrop32.44762 03:03:42 14.09.2025 Show
Trojan.MulDrop32.43426 03:03:42 14.09.2025 Show
Trojan.MulDrop32.43931 03:03:42 14.09.2025 Show
Trojan.MulDrop32.43995 03:03:41 14.09.2025 Show
Trojan.MulDrop32.44366 03:03:41 14.09.2025 Show
Trojan.MulDrop32.43956 03:03:41 14.09.2025 Show
Trojan.MulDrop32.43689 03:03:41 14.09.2025 Show
Trojan.DownLoader48.64931 03:03:41 14.09.2025 Show
Trojan.MulDrop32.44038 03:03:41 14.09.2025 Show
Trojan.DownLoader48.64911 03:03:41 14.09.2025 Show
Trojan.MulDrop32.44079 03:03:41 14.09.2025 Show
Trojan.MulDrop32.44342 03:03:41 14.09.2025 Show
Trojan.MulDrop32.44204 03:03:40 14.09.2025 Show
Trojan.MulDrop32.44630 03:03:40 14.09.2025 Show
Trojan.MulDrop32.44540 03:03:40 14.09.2025 Show
Trojan.MulDrop32.43691 03:03:40 14.09.2025 Show
Trojan.Siggen31.55695 03:03:40 14.09.2025 Show
Trojan.MulDrop32.44117 03:03:39 14.09.2025 Show
Trojan.Remcos.374 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44217 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44403 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44601 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44627 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44106 03:03:39 14.09.2025 Show
Trojan.Siggen31.55849 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44770 03:03:39 14.09.2025 Show
Trojan.MulDrop32.43983 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44136 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44464 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44517 03:03:39 14.09.2025 Show
Trojan.MulDrop32.43980 03:03:39 14.09.2025 Show
Trojan.MulDrop32.44545 03:03:38 14.09.2025 Show
Trojan.MulDrop32.44286 03:03:38 14.09.2025 Show
Trojan.MulDrop32.44184 03:03:37 14.09.2025 Show
Trojan.Hosts.52778 03:03:37 14.09.2025 Show
Trojan.MulDrop32.44291 03:03:37 14.09.2025 Show
Trojan.MulDrop32.44687 03:03:37 14.09.2025 Show
Trojan.MulDrop32.44454 03:03:37 14.09.2025 Show
Trojan.MulDrop32.44753 03:03:36 14.09.2025 Show
Trojan.Inject6.2208 03:03:36 14.09.2025 Show
Trojan.MulDrop32.44202 03:03:36 14.09.2025 Show
Trojan.DownLoader48.64859 03:03:36 14.09.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.