Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.1531
Download.Trojan Symantec Trojan.DownLoader.880
Download.Trojan Symantec Trojan.DownLoader.587
Download.Trojan Symantec Trojan.Daum
Download.Trojan Symantec Trojan.Urload
Download.Trojan Symantec Trojan.DownLoader.102
Download.Trojan Symantec Trojan.DownLoader.17408
Download.Trojan Symantec Trojan.Click.636
Download.Trojan Symantec Trojan.Click.652
Download.Trojan Symantec Trojan.Lar.7200
Download.Trojan Symantec Trojan.DownLoader.986
Download.Trojan Symantec Trojan.DownLoader.1004
Download.Trojan Symantec Trojan.Hippyweb
Download.Trojan Symantec Trojan.MulDrop.2423
Download.Trojan Symantec Trojan.DownLoader.1615
Download.Trojan Symantec Trojan.MulDrop.1190
Download.Trojan Symantec Trojan.MulDrop.1352
Download.Trojan Symantec Trojan.Lamdez
Download.Trojan Symantec Trojan.DownLoader.2887
Download.Trojan Symantec Trojan.DownLoader.2986
Download.Trojan Symantec Trojan.MulDrop.186
Download.Trojan Symantec Trojan.PWS.Banker.636
Download.Trojan Symantec Trojan.MulDrop.262
Download.Trojan Symantec Trojan.MulDrop.486
Download.Trojan Symantec BackDoor.RegSec
Download.Trojan Symantec Trojan.StartPage.485
Download.Trojan Symantec Trojan.DownLoader.942
Download.Trojan Symantec Trojan.DownLoader.1048
Download.Trojan Symantec Trojan.MulDrop.489
Download.Trojan Symantec Trojan.Veritas
Download.Trojan Symantec Trojan.DownLoader.516
Download.Trojan Symantec Trojan.DownLoader.2720
Download.Trojan Symantec Trojan.LowZones.96
Download.Trojan Symantec Trojan.WinShow.16834
Download.Trojan Symantec Trojan.DownLoader.3485
Download.Trojan Symantec Trojan.DownLoader.3135
Download.Trojan Symantec Trojan.DownLoader.80
Download.Trojan Symantec Trojan.ScorpClick
Download.Trojan Symantec Trojan.DownLoader.837
Download.Trojan Symantec Trojan.DownLoader.6587
Download.Trojan Symantec Trojan.DownLoader.1189
Download.Trojan Symantec Trojan.DownLoader.1512
Download.Trojan Symantec Trojan.DownLoader.32768
Download.Trojan Symantec BackDoor.Generic.625
Download.Trojan Symantec Trojan.DownLoader.144
Download.Trojan Symantec Trojan.DownLoader.381
Download.Trojan Symantec Trojan.DownLoader.428
Download.Trojan Symantec Trojan.DownLoader.873
Download.Trojan Symantec Trojan.DownLoader.877
Download.Trojan Symantec Trojan.DownLoader.802

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.