Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.3630
Download.Trojan Symantec Trojan.DownLoader.4422
Download.Trojan Symantec Trojan.DownLoader.4642
Download.Trojan Symantec Trojan.DownLoader.4690
Download.Trojan Symantec Trojan.DownLoader.3968
Download.Trojan Symantec Trojan.DownLoader.3363
Download.Trojan Symantec Trojan.DownLoader.3510
Download.Trojan Symantec Trojan.DownLoader.3731
Download.Trojan Symantec Trojan.DownLoader.3734
Download.Trojan Symantec Trojan.DownLoader.3884
Download.Trojan Symantec Trojan.DownLoader.5405
Download.Trojan Symantec Trojan.DownLoader.4355
Download.Trojan Symantec BackDoor.Cmrss
Download.Trojan Symantec Trojan.DownLoader.4003
Download.Trojan Symantec Trojan.DownLoader.3883
Download.Trojan Symantec Trojan.DownLoader.3694
Download.Trojan Symantec Trojan.DownLoader.4033
Download.Trojan Symantec Trojan.DownLoader.3565
Download.Trojan Symantec Trojan.DownLoader.4159
Download.Trojan Symantec Trojan.DownLoader.3264
Download.Trojan Symantec Trojan.DownLoader.3506
Download.Trojan Symantec Trojan.DownLoader.4976
Download.Trojan Symantec Trojan.DownLoader.3545
Download.Trojan Symantec Trojan.DownLoader.5656
Download.Trojan Symantec Trojan.DownLoader.5592
Download.Trojan Symantec Trojan.DownLoader.2694
Download.Trojan Symantec Trojan.DownLoader.5652
Download.Trojan Symantec Trojan.DownLoader.4815
Download.Trojan Symantec Trojan.DownLoader.4816
Download.Trojan Symantec Trojan.DownLoader.4500
Download.Trojan Symantec Trojan.Cidra
Download.Trojan Symantec Trojan.DownLoader.3417
Download.Trojan Symantec Win32.HLLM.Netsky.61984
Download.Trojan Symantec Win32.HLLM.Buch
Download.Trojan Symantec Win32.HLLM.Netsky
Download.Trojan Symantec Trojan.DownLoader.2102
Download.Trojan Symantec Win32.Beavis.5632
Download.Trojan Symantec Win32.HLLM.Beagle.19829
Download.Trojan Symantec Win32.HLLM.Beagle.9219
Download.Trojan Symantec Trojan.DownLoader.3958
Download.Trojan Symantec Trojan.DownLoader.1564
Download.Trojan Symantec Trojan.DownLoader.3266
Download.Trojan Symantec Trojan.DownLoader.3684
Download.Trojan Symantec Trojan.DownLoader.4667
Download.Trojan Symantec Trojan.DownLoader.4190
Download.Trojan Symantec Trojan.DownLoader.4312
Download.Trojan Symantec Trojan.DownLoader.4774
Download.Trojan Symantec Trojan.DownLoader.4685
Download.Trojan Symantec Trojan.DownLoader.4550
Download.Trojan Symantec Trojan.DownLoader.4188

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.