Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Siggen4.11933 03:05:16 05.12.2025 Show
Trojan.MulDrop34.14565 03:05:16 05.12.2025 Show
Trojan.DownLoader49.16838 03:05:16 05.12.2025 Show
Trojan.MulDrop34.14150 03:05:16 05.12.2025 Show
Trojan.MulDrop34.14673 03:05:15 05.12.2025 Show
Trojan.Siggen32.11370 03:05:15 05.12.2025 Show
Trojan.MulDrop34.13840 03:05:15 05.12.2025 Show
Trojan.PWS.Siggen4.11568 03:05:15 05.12.2025 Show
Trojan.Encoder.43807 03:05:15 05.12.2025 Show
Trojan.PWS.Siggen4.11844 03:05:14 05.12.2025 Show
Trojan.DownLoader49.16850 03:05:14 05.12.2025 Show
Trojan.MulDrop34.14311 03:05:14 05.12.2025 Show
Trojan.PWS.Siggen4.11657 03:05:14 05.12.2025 Show
Trojan.MulDrop34.14445 03:05:14 05.12.2025 Show
Trojan.PWS.Siggen4.12282 03:05:14 05.12.2025 Show
Trojan.MulDrop34.14558 03:05:14 05.12.2025 Show
Trojan.PWS.Siggen4.12197 03:05:14 05.12.2025 Show
Trojan.PWS.Siggen4.11605 03:05:14 05.12.2025 Show
Trojan.MulDrop34.14024 03:05:13 05.12.2025 Show
Trojan.PWS.Siggen4.11419 03:05:13 05.12.2025 Show
Trojan.MulDrop34.14635 03:05:13 05.12.2025 Show
Trojan.MulDrop34.14386 03:05:13 05.12.2025 Show
Trojan.PWS.Siggen4.11429 03:05:13 05.12.2025 Show
Trojan.MulDrop34.14883 03:05:13 05.12.2025 Show
Trojan.PWS.Siggen4.11462 03:05:13 05.12.2025 Show
Trojan.PWS.Siggen4.11801 03:05:12 05.12.2025 Show
Trojan.PWS.Siggen4.11629 03:05:12 05.12.2025 Show
Trojan.PWS.Siggen4.12005 03:05:11 05.12.2025 Show
Trojan.MulDrop34.15123 03:05:11 05.12.2025 Show
Trojan.PWS.Siggen4.12426 03:05:11 05.12.2025 Show
Trojan.PWS.Siggen4.11917 03:05:10 05.12.2025 Show
Trojan.Inject6.18260 03:05:10 05.12.2025 Show
Trojan.MulDrop34.15430 03:05:09 05.12.2025 Show
Trojan.MulDrop34.13862 03:05:09 05.12.2025 Show
Trojan.MulDrop34.14439 03:05:09 05.12.2025 Show
Trojan.PWS.Siggen4.11387 03:05:09 05.12.2025 Show
Trojan.PWS.Siggen4.11569 03:05:08 05.12.2025 Show
Trojan.PWS.Siggen4.12260 03:05:08 05.12.2025 Show
Trojan.MulDrop34.14464 03:05:08 05.12.2025 Show
Trojan.MulDrop34.15345 03:05:08 05.12.2025 Show
Trojan.MulDrop34.14451 03:05:08 05.12.2025 Show
Trojan.MulDrop34.14561 03:05:08 05.12.2025 Show
Trojan.PWS.Siggen4.11456 03:05:08 05.12.2025 Show
Trojan.KillFiles2.4967 03:05:07 05.12.2025 Show
X97M.DownLoader.2257 03:05:07 05.12.2025 Show
Trojan.MulDrop34.14524 03:05:07 05.12.2025 Show
Trojan.MulDrop34.14611 03:05:07 05.12.2025 Show
Trojan.MulDrop34.14354 03:05:07 05.12.2025 Show
Trojan.PWS.Siggen4.11995 03:05:06 05.12.2025 Show
Trojan.MulDrop34.13931 03:05:06 05.12.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.