Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.1355
Download.Trojan Symantec Trojan.DownLoader.844
Download.Trojan Symantec Trojan.DownLoader.1427
Download.Trojan Symantec Trojan.DownLoader.1141
Download.Trojan Symantec Trojan.DownLoader.204
Download.Trojan Symantec Trojan.DownLoader.1013
Download.Trojan Symantec Trojan.DownLoader.1166
Download.Trojan Symantec Trojan.DownLoader.1051
Download.Trojan Symantec Trojan.DownLoader.661
Download.Trojan Symantec Trojan.DownLoader.1685
Download.Trojan Symantec Trojan.DownLoader.394
Download.Trojan Symantec Trojan.DownLoader.478
Download.Trojan Symantec Trojan.DownLoader.1458
Download.Trojan Symantec Trojan.DownLoader.612
Download.Trojan Symantec Trojan.DownLoader.566
Download.Trojan Symantec Trojan.DownLoader.433
Download.Trojan Symantec Trojan.DownLoader.406
Download.Trojan Symantec Trojan.DownLoader.711
Download.Trojan Symantec Trojan.DownLoader.512
Download.Trojan Symantec Trojan.DownLoader.526
Download.Trojan Symantec Trojan.DownLoader.425
Download.Trojan Symantec Trojan.DownLoader.536
Download.Trojan Symantec Trojan.Reductor.10
Download.Trojan Symantec Trojan.Reductor
Download.Trojan Symantec Trojan.DownLoader.222
Download.Trojan Symantec Trojan.DownLoader.884
Download.Trojan Symantec Trojan.DownLoader.620
Download.Trojan Symantec Trojan.DownLoader.126
Download.Trojan Symantec Trojan.Tinydl
Download.Trojan Symantec Trojan.DownLoader.28672
Download.Trojan Symantec Trojan.DownLoader.127
Download.Trojan Symantec Trojan.DownLoader.14336
Download.Trojan Symantec Trojan.DownLoader.24123
Download.Trojan Symantec Trojan.DownLoader.3001
Download.Trojan Symantec Trojan.DownLoader.3117
Download.Trojan Symantec Trojan.DownLoader.3921
Download.Trojan Symantec Trojan.DownLoader.611
Download.Trojan Symantec Trojan.DownLoader.2464
Download.Trojan Symantec Trojan.DownLoader.2425
Download.Trojan Symantec Trojan.DownLoader.1701
Download.Trojan Symantec Trojan.DownLoader.2516
Download.Trojan Symantec Trojan.DownLoader.2435
Download.Trojan Symantec Trojan.DownLoader.2032
Download.Trojan Symantec Trojan.DownLoader.2594
Download.Trojan Symantec Trojan.DownLoader.3082
Download.Trojan Symantec Trojan.DownLoader.2327
Download.Trojan Symantec Trojan.DownLoader.2479
Download.Trojan Symantec Trojan.DownLoader.3299
Download.Trojan Symantec Trojan.DownLoader.1850
Download.Trojan Symantec Trojan.DownLoader.1964

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.