Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop30.2298 03:14:11 28.03.2025 Show
Trojan.DownLoader48.22454 03:14:10 28.03.2025 Show
Trojan.MulDrop30.8198 03:14:08 28.03.2025 Show
Trojan.MulDrop30.1753 03:14:08 28.03.2025 Show
Trojan.MulDrop30.8219 03:14:05 28.03.2025 Show
Trojan.MulDrop30.1860 03:14:05 28.03.2025 Show
Trojan.MulDrop30.1887 03:14:05 28.03.2025 Show
Trojan.DownLoader48.22545 03:14:04 28.03.2025 Show
Trojan.MulDrop30.1844 03:14:04 28.03.2025 Show
Trojan.MulDrop30.8278 03:14:04 28.03.2025 Show
Trojan.MulDrop30.1241 03:14:03 28.03.2025 Show
Trojan.MulDrop30.8291 03:14:03 28.03.2025 Show
Trojan.DownLoader48.22463 03:14:03 28.03.2025 Show
Trojan.MulDrop30.7116 03:14:03 28.03.2025 Show
Trojan.MulDrop30.5946 03:14:02 28.03.2025 Show
Trojan.Siggen31.4394 03:14:02 28.03.2025 Show
Trojan.MulDrop30.3478 03:14:02 28.03.2025 Show
Trojan.MulDrop30.1781 03:14:02 28.03.2025 Show
Trojan.MulDrop30.2234 03:14:02 28.03.2025 Show
Trojan.MulDrop30.5781 03:14:02 28.03.2025 Show
Trojan.MulDrop30.2239 03:14:01 28.03.2025 Show
Trojan.MulDrop30.6201 03:14:00 28.03.2025 Show
Trojan.MulDrop30.1691 03:14:00 28.03.2025 Show
Trojan.Inject5.19831 03:14:00 28.03.2025 Show
Trojan.Siggen31.4412 03:14:00 28.03.2025 Show
Trojan.MulDrop30.7594 03:13:59 28.03.2025 Show
Trojan.MulDrop30.1766 03:13:59 28.03.2025 Show
Trojan.DownLoader48.22688 03:13:59 28.03.2025 Show
Trojan.MulDrop30.5881 03:13:59 28.03.2025 Show
Trojan.Siggen31.4535 03:13:58 28.03.2025 Show
Trojan.MulDrop30.2134 03:13:58 28.03.2025 Show
Trojan.MulDrop30.5911 03:13:56 28.03.2025 Show
Trojan.MulDrop30.8348 03:13:56 28.03.2025 Show
Trojan.Siggen31.4320 03:13:56 28.03.2025 Show
Trojan.MulDrop30.2511 03:13:55 28.03.2025 Show
Trojan.Siggen31.4338 03:13:55 28.03.2025 Show
Trojan.MulDrop30.6411 03:13:55 28.03.2025 Show
Trojan.MulDrop30.1568 03:13:55 28.03.2025 Show
Trojan.Siggen31.4361 03:13:55 28.03.2025 Show
Trojan.MulDrop30.5292 03:13:55 28.03.2025 Show
Trojan.MulDrop30.6161 03:13:54 28.03.2025 Show
Trojan.MulDrop30.8273 03:13:53 28.03.2025 Show
Trojan.MulDrop30.1836 03:13:52 28.03.2025 Show
Trojan.MulDrop30.1447 03:13:52 28.03.2025 Show
Trojan.MulDrop30.1397 03:13:51 28.03.2025 Show
Trojan.MulDrop30.2167 03:13:51 28.03.2025 Show
Trojan.MulDrop30.8218 03:13:51 28.03.2025 Show
Trojan.MulDrop30.2269 03:13:51 28.03.2025 Show
Trojan.MulDrop30.2737 03:13:49 28.03.2025 Show
Trojan.Siggen31.4352 03:13:49 28.03.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.