FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Dropper.Kobcka.Gen.1 aliases:

Name Vendor Dr.Web classification name
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.12655
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.237
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.320
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Packed.254
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.28430
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.54123
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Ader
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.32229
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.29459
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.MulDrop.30421
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Packed.362
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Packed.2352
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Siggen.1948
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Siggen.1711
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Siggen.1653
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.49586
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.63566
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.56904
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.23598
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.5309
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.2077
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.206
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.59056
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.3682
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Siggen.1700
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.157
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.MulDrop.17530
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Packed.324
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.223
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.233
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.220
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.193
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.MulDrop.30728
Trojan.Dropper.Kobcka.Gen.1 BitDefender Win32.HLLC.Sys.1
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.32942
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoad.33158
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Packed.438
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.49451
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Rntm.7
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.50037
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.MulDrop.16011
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.62633
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.205
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.DownLoader.62637
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.204
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Rntm.8
Trojan.Dropper.Kobcka.Gen.1 BitDefender BackDoor.Bulknet.194
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Inject.3570
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.LanMan.33
Trojan.Dropper.Kobcka.Gen.1 BitDefender Trojan.Rntm.6

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies