Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan-Downloader.Win32.Mutant.aim aliases:

Name Vendor Dr.Web classification name
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.Rntm.9
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.Rntm.10
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.DownLoader.50037
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.207
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.Rntm
Trojan-Downloader.Win32.Mutant.aim VirusBlokAda Trojan.Rntm.10
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.DownLoader.63903
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.170
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.208
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.157
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.112
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.206
Trojan-Downloader.Win32.Mutant.aim VirusBlokAda BackDoor.Bulknet.207
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.171
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.214
Trojan-Downloader.Win32.Mutant.aim VirusBlokAda Trojan.Rntm
Trojan-Downloader.Win32.Mutant.aim Kaspersky BackDoor.Bulknet.188
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.DownLoad1.35851
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.DownLoader1.897
Trojan-Downloader.Win32.Mutant.aim VirusBlokAda Trojan.DownLoader1.897
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.DownLoader1.560
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.DownLoad1.36686
Trojan-Downloader.Win32.Mutant.aim Kaspersky Trojan.DownLoad1.40931
Trojan-Downloader.Win32.Mutant.aim VirusBlokAda Trojan.DownLoad.57101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.