Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Inject5.55603 03:01:21 12.06.2025 Show
Trojan.MulDrop32.9858 03:01:21 12.06.2025 Show
Trojan.MulDrop32.9783 03:01:20 12.06.2025 Show
Trojan.Siggen31.33092 03:01:20 12.06.2025 Show
Trojan.Inject5.55552 03:01:20 12.06.2025 Show
Trojan.MulDrop32.9949 03:01:20 12.06.2025 Show
Trojan.Siggen31.33087 03:01:20 12.06.2025 Show
Trojan.Inject5.55522 03:01:20 12.06.2025 Show
Trojan.Siggen31.33109 03:01:20 12.06.2025 Show
Win32.HLLW.Autoruner3.12431 03:01:20 12.06.2025 Show
Trojan.Inject5.55638 03:01:20 12.06.2025 Show
Trojan.Siggen31.33133 03:01:20 12.06.2025 Show
Trojan.Siggen31.33079 03:01:20 12.06.2025 Show
Trojan.Siggen31.32992 03:01:20 12.06.2025 Show
Trojan.Inject5.55484 03:01:20 12.06.2025 Show
Trojan.MulDrop32.9696 03:01:20 12.06.2025 Show
Trojan.MulDrop32.9944 03:01:20 12.06.2025 Show
Trojan.DownLoader48.43090 03:01:19 12.06.2025 Show
Trojan.MulDrop32.9965 03:01:19 12.06.2025 Show
Trojan.Siggen31.33178 03:01:19 12.06.2025 Show
Trojan.Siggen31.33238 03:01:19 12.06.2025 Show
Trojan.Siggen31.33005 03:01:19 12.06.2025 Show
Trojan.Inject5.55579 03:01:19 12.06.2025 Show
Trojan.Siggen31.33007 03:01:19 12.06.2025 Show
Trojan.MulDrop32.9912 03:01:19 12.06.2025 Show
Trojan.Siggen31.33091 03:01:19 12.06.2025 Show
Trojan.MulDrop32.9827 03:01:19 12.06.2025 Show
Trojan.Inject5.55499 03:01:19 12.06.2025 Show
Trojan.Inject5.55627 03:01:19 12.06.2025 Show
Trojan.Inject5.55621 03:01:19 12.06.2025 Show
Trojan.MulDrop32.9981 03:01:19 12.06.2025 Show
Trojan.MulDrop32.9852 03:01:19 12.06.2025 Show
Trojan.Siggen31.33179 03:01:19 12.06.2025 Show
BackDoor.Maxplus.15057 03:01:19 12.06.2025 Show
Trojan.Inject5.55596 03:01:18 12.06.2025 Show
Trojan.Siggen31.33001 03:01:18 12.06.2025 Show
Trojan.MulDrop32.9945 03:01:18 12.06.2025 Show
Trojan.MulDrop32.9960 03:01:18 12.06.2025 Show
Trojan.Inject5.55493 03:01:18 12.06.2025 Show
Trojan.MulDrop32.9786 03:01:18 12.06.2025 Show
Trojan.Siggen31.33107 03:01:18 12.06.2025 Show
Trojan.Siggen31.33031 03:01:18 12.06.2025 Show
Trojan.MulDrop32.9689 03:01:18 12.06.2025 Show
Trojan.Siggen31.33081 03:01:18 12.06.2025 Show
Trojan.MulDrop32.9889 03:01:18 12.06.2025 Show
Trojan.DownLoader48.43119 03:01:18 12.06.2025 Show
Trojan.Inject5.55633 03:01:18 12.06.2025 Show
Trojan.DownLoader48.43054 03:01:18 12.06.2025 Show
Trojan.DownLoader48.43101 03:01:18 12.06.2025 Show
Trojan.Siggen31.33124 03:01:18 12.06.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.