Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Troxen!rts aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38776
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.35924
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38323
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.36637
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.42046
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.36183
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.41332
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.36386
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.37742
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.39190
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38711
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.37963
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.36483
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.41711
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.35746
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40932
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40724
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.35505
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40744
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.42052
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.35963
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.41406
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40027
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40246
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.37732
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40641
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.37965
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.36155
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.39910
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38739
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40518
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.37914
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38212
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.41997
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38588
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.41644
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.36346
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.37272
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38298
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40564
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.38622
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.41429
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.42089
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40496
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.35402
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.39111
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40840
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.40852
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.39741
TrojanDownloader:Win32/Troxen!rts Microsoft Trojan.DownLoad1.36655

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.