FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_DRPR-3 aliases:

Name Vendor Dr.Web classification name
Mal_DRPR-3 Trend Micro Trojan.MulDrop.2277
Mal_DRPR-3 Trend Micro Trojan.MulDrop.2108
Mal_DRPR-3 Trend Micro SS.Generator.11
Mal_DRPR-3 Trend Micro BackDoor.Ghirai
Mal_DRPR-3 Trend Micro Trojan.MulDrop.8556
Mal_DRPR-3 Trend Micro Trojan.MulDrop.8447
Mal_DRPR-3 Trend Micro Trojan.MulDrop.16445
Mal_DRPR-3 Trend Micro Trojan.MulDrop.15748
Mal_DRPR-3 Trend Micro Trojan.MulDrop.818
Mal_DRPR-3 Trend Micro Trojan.MulDrop.8198
Mal_DRPR-3 Trend Micro Trojan.NtRootKit.448
Mal_DRPR-3 Trend Micro Trojan.MulDrop.11332
Mal_DRPR-3 Trend Micro Trojan.MulDrop.15489
Mal_DRPR-3 Trend Micro BackDoor.DTV.31
Mal_DRPR-3 Trend Micro Trojan.MulDrop.16544
Mal_DRPR-3 Trend Micro Trojan.MulDrop.12137
Mal_DRPR-3 Trend Micro Trojan.MulDrop.6106
Mal_DRPR-3 Trend Micro Trojan.MulDrop.13665
Mal_DRPR-3 Trend Micro Trojan.MulDrop.13691
Mal_DRPR-3 Trend Micro BackDoor.Kyrdor
Mal_DRPR-3 Trend Micro Trojan.DownLoader.35306
Mal_DRPR-3 Trend Micro Trojan.MulDrop.2054
Mal_DRPR-3 Trend Micro Trojan.Warring
Mal_DRPR-3 Trend Micro Trojan.MulDrop.3918
Mal_DRPR-3 Trend Micro Trojan.MulDrop.17524
Mal_DRPR-3 Trend Micro Trojan.Packed.494
Mal_DRPR-3 Trend Micro Trojan.DownLoader.3972
Mal_DRPR-3 Trend Micro Trojan.MulDrop.15534
Mal_DRPR-3 Trend Micro Trojan.MulDrop.10201
Mal_DRPR-3 Trend Micro Trojan.MulDrop.8367
Mal_DRPR-3 Trend Micro Trojan.MulDrop.13751
Mal_DRPR-3 Trend Micro Trojan.DownLoader.3719
Mal_DRPR-3 Trend Micro Trojan.NtRootKit.1337
Mal_DRPR-3 Trend Micro Trojan.DownLoader.9772
Mal_DRPR-3 Trend Micro Trojan.MulDrop.5888
Mal_DRPR-3 Trend Micro Trojan.MulDrop.4263
Mal_DRPR-3 Trend Micro Trojan.MulDrop.4293
Mal_DRPR-3 Trend Micro Trojan.PWS.GoldSpy
Mal_DRPR-3 Trend Micro Trojan.MulDrop.6456
Mal_DRPR-3 Trend Micro Trojan.MulDrop.13822
Mal_DRPR-3 Trend Micro Trojan.MulDrop.13666
Mal_DRPR-3 Trend Micro Trojan.MulDrop.8704
Mal_DRPR-3 Trend Micro Trojan.MulDrop.16412
Mal_DRPR-3 Trend Micro Trojan.MulDrop.15392
Mal_DRPR-3 Trend Micro Trojan.DownLoader.6099
Mal_DRPR-3 Trend Micro Trojan.DownLoader.62486
Mal_DRPR-3 Trend Micro Trojan.MulDrop.10155
Mal_DRPR-3 Trend Micro Trojan.MulDrop.3083
Mal_DRPR-3 Trend Micro Trojan.MulDrop.11295
Mal_DRPR-3 Trend Micro Trojan.MulDrop.6760

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies