Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.StartPage.528
Download.Trojan Symantec Trojan.Post
Download.Trojan Symantec Trojan.StartPage.513
Download.Trojan Symantec Trojan.WebDL.2
Download.Trojan Symantec Adware.Adlog
Download.Trojan Symantec BackDoor.Nethief.51
Download.Trojan Symantec Trojan.DownLoader.446
Download.Trojan Symantec IRC.Nyrobot
Download.Trojan Symantec Trojan.CgiLogger.10
Download.Trojan Symantec Trojan.Ill.20
Download.Trojan Symantec Trojan.MultiDL.1
Download.Trojan Symantec Trojan.DownLoader.585
Download.Trojan Symantec Trojan.DownLoader.2040
Download.Trojan Symantec Adware.Overpro
Download.Trojan Symantec Trojan.DownLoader.189
Download.Trojan Symantec Trojan.Cdxer
Download.Trojan Symantec Trojan.DownLoader.123
Download.Trojan Symantec Trojan.Nimph
Download.Trojan Symantec Trojan.Fearless.12
Download.Trojan Symantec Trojan.StartPage.316
Download.Trojan Symantec Trojan.StartPage.919
Download.Trojan Symantec Trojan.WebDL.11
Download.Trojan Symantec Trojan.DownLoader.2043
Download.Trojan Symantec Trojan.DownLoader.2382
Download.Trojan Symantec Trojan.MulDrop.2108
Download.Trojan Symantec Trojan.MulDrop.1559
Download.Trojan Symantec Trojan.DownLoader.1417
Download.Trojan Symantec Trojan.MulDrop.1533
Download.Trojan Symantec Trojan.DownLoader.789
Download.Trojan Symantec Trojan.DownLoader.600
Download.Trojan Symantec Trojan.DownLoader.2426
Download.Trojan Symantec BackDoor.Xjos
Download.Trojan Symantec Trojan.MulDrop.2556
Download.Trojan Symantec Trojan.DownLoader.688
Download.Trojan Symantec Trojan.DownLoader.655
Download.Trojan Symantec Trojan.DownLoader.1813
Download.Trojan Symantec Trojan.MulDrop.751
Download.Trojan Symantec Trojan.MulDrop.1432
Download.Trojan Symantec Trojan.MulDrop.1431
Download.Trojan Symantec Trojan.MulDrop.2220
Download.Trojan Symantec Trojan.MulDrop.1113
Download.Trojan Symantec Trojan.ZDown.12
Download.Trojan Symantec Trojan.DownLoader.100
Download.Trojan Symantec Trojan.DownLoader.1003
Download.Trojan Symantec Trojan.DownLoader.1064
Download.Trojan Symantec Trojan.DownLoader.1102
Download.Trojan Symantec Trojan.ZDown
Download.Trojan Symantec Trojan.ZDown.10
Download.Trojan Symantec Trojan.DownLoader.171
Download.Trojan Symantec Trojan.DownLoader.1103

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.