Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.2385
Download.Trojan Symantec Trojan.DownLoader.1570
Download.Trojan Symantec Trojan.DownLoader.2351
Download.Trojan Symantec Trojan.Barole
Download.Trojan Symantec Trojan.DownLoader.766
Download.Trojan Symantec Trojan.DownLoader.117
Download.Trojan Symantec Trojan.DownLoader.1731
Download.Trojan Symantec Trojan.Isbar.80
Download.Trojan Symantec Trojan.Isbar.76
Download.Trojan Symantec Trojan.Pigmail
Download.Trojan Symantec Trojan.DownLoader.798
Download.Trojan Symantec Trojan.DownLoader.1159
Download.Trojan Symantec Trojan.Rameh
Download.Trojan Symantec Adware.NavHelper
Download.Trojan Symantec Trojan.DownLoader.1930
Download.Trojan Symantec Trojan.DownLoader.1441
Download.Trojan Symantec Trojan.DownLoader.1565
Download.Trojan Symantec Trojan.DownLoader.1923
Download.Trojan Symantec Trojan.DownLoader.119
Download.Trojan Symantec BackDoor.Tcmd.11
Download.Trojan Symantec BackDoor.Relback
Download.Trojan Symantec Trojan.DownLoader.2234
Download.Trojan Symantec Trojan.DownLoader.695
Download.Trojan Symantec Trojan.DownLoader.2890
Download.Trojan Symantec Trojan.Aphex.2
Download.Trojan Symantec Trojan.Aicore.36864
Download.Trojan Symantec Trojan.Zuka
Download.Trojan Symantec Trojan.MulDrop.2335
Download.Trojan Symantec Trojan.MulDrop.1865
Download.Trojan Symantec Trojan.MulDrop.2421
Download.Trojan Symantec Trojan.MulDrop.1892
Download.Trojan Symantec Trojan.Korn
Download.Trojan Symantec Trojan.DownLoader.3200
Download.Trojan Symantec Trojan.DownLoader.1385
Download.Trojan Symantec Trojan.DownLoader.2340
Download.Trojan Symantec Trojan.DownLoader.2726
Download.Trojan Symantec Trojan.MulDrop.844
Download.Trojan Symantec Trojan.DownLoader.886
Download.Trojan Symantec Trojan.PWS.Legmir.196
Download.Trojan Symantec Trojan.DownLoader.186
Download.Trojan Symantec Trojan.DownLoader.2616
Download.Trojan Symantec Trojan.DownLoader.3284
Download.Trojan Symantec Trojan.DownLoader.625
Download.Trojan Symantec Trojan.DownLoader.1356
Download.Trojan Symantec Trojan.Looki
Download.Trojan Symantec Trojan.WebpAd
Download.Trojan Symantec Trojan.DownLoader.551
Download.Trojan Symantec Trojan.DownLoader.1781
Download.Trojan Symantec Trojan.DownLoader.615
Download.Trojan Symantec Trojan.DownLoader.689

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.