Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Inject6.15588 03:10:34 16.11.2025 Show
Trojan.DownLoader49.13725 03:10:34 16.11.2025 Show
Trojan.MulDrop33.56264 03:10:34 16.11.2025 Show
Trojan.MulDrop33.57094 03:10:34 16.11.2025 Show
Trojan.MulDrop33.56881 03:10:34 16.11.2025 Show
Trojan.MulDrop33.58021 03:10:34 16.11.2025 Show
Trojan.DownLoader49.13804 03:10:34 16.11.2025 Show
Trojan.MulDrop33.56839 03:10:33 16.11.2025 Show
Trojan.MulDrop33.57090 03:10:33 16.11.2025 Show
Trojan.MulDrop33.58797 03:10:33 16.11.2025 Show
Trojan.MulDrop33.56346 03:10:33 16.11.2025 Show
Trojan.MulDrop33.56470 03:10:33 16.11.2025 Show
Trojan.MulDrop33.56244 03:10:33 16.11.2025 Show
Trojan.DownLoader49.13684 03:10:33 16.11.2025 Show
Trojan.MulDrop33.56996 03:10:33 16.11.2025 Show
Trojan.DownLoader49.13749 03:10:33 16.11.2025 Show
Trojan.MulDrop33.56618 03:10:33 16.11.2025 Show
Trojan.DownLoader49.13797 03:10:33 16.11.2025 Show
Trojan.DownLoader49.13743 03:10:33 16.11.2025 Show
Trojan.MulDrop33.59301 03:10:32 16.11.2025 Show
Trojan.Siggen32.7747 03:10:32 16.11.2025 Show
Trojan.MulDrop33.56184 03:10:32 16.11.2025 Show
Trojan.MulDrop33.56739 03:10:32 16.11.2025 Show
Trojan.MulDrop33.57390 03:10:32 16.11.2025 Show
Trojan.Siggen32.7652 03:10:32 16.11.2025 Show
Trojan.MulDrop33.55753 03:10:31 16.11.2025 Show
Trojan.Siggen32.7635 03:10:31 16.11.2025 Show
Trojan.MulDrop33.56983 03:10:30 16.11.2025 Show
Trojan.MulDrop33.55582 03:10:30 16.11.2025 Show
Trojan.MulDrop33.55382 03:10:30 16.11.2025 Show
Trojan.MulDrop33.57161 03:10:30 16.11.2025 Show
Trojan.MulDrop33.55404 03:10:29 16.11.2025 Show
Trojan.Inject6.15687 03:10:29 16.11.2025 Show
Trojan.MulDrop33.56298 03:10:29 16.11.2025 Show
Trojan.MulDrop33.57420 03:10:28 16.11.2025 Show
Trojan.MulDrop33.56798 03:10:28 16.11.2025 Show
Trojan.Inject6.15590 03:10:28 16.11.2025 Show
Trojan.MulDrop33.57672 03:10:28 16.11.2025 Show
Trojan.Inject6.15756 03:10:28 16.11.2025 Show
Trojan.MulDrop33.57423 03:10:28 16.11.2025 Show
Trojan.MulDrop33.57187 03:10:28 16.11.2025 Show
Trojan.MulDrop33.56884 03:10:28 16.11.2025 Show
Trojan.MulDrop33.55426 03:10:28 16.11.2025 Show
Trojan.DownLoader49.13722 03:10:28 16.11.2025 Show
Trojan.Siggen32.7801 03:10:27 16.11.2025 Show
Trojan.Inject6.15744 03:10:27 16.11.2025 Show
Trojan.MulDrop33.56377 03:10:27 16.11.2025 Show
Trojan.MulDrop33.56938 03:10:26 16.11.2025 Show
Trojan.MulDrop33.56119 03:10:26 16.11.2025 Show
Trojan.MulDrop33.58198 03:10:26 16.11.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.