Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.85
Download.Trojan Symantec Trojan.Hardvir
Download.Trojan Symantec Trojan.StartPage.219
Download.Trojan Symantec Trojan.Inject
Download.Trojan Symantec Trojan.StartPage.281
Download.Trojan Symantec Trojan.DownLoader.827
Download.Trojan Symantec Trojan.DownLoader.574
Download.Trojan Symantec Trojan.DownLoader.484
Download.Trojan Symantec Trojan.DownLoader.3825
Download.Trojan Symantec Trojan.Ranky
Download.Trojan Symantec Trojan.DownLoader.4597
Download.Trojan Symantec Trojan.DownLoader.685
Download.Trojan Symantec Trojan.PWS.Agu
Download.Trojan Symantec Trojan.PWS.Gamania
Download.Trojan Symantec Trojan.DownLoader.1497
Download.Trojan Symantec Trojan.Proxy.385
Download.Trojan Symantec Trojan.DownLoader.1739
Download.Trojan Symantec Trojan.Gric
Download.Trojan Symantec Trojan.Proxy.227
Download.Trojan Symantec Trojan.Proxy.180
Download.Trojan Symantec Trojan.Proxy.179
Download.Trojan Symantec Trojan.Medude
Download.Trojan Symantec Trojan.Proxy.69
Download.Trojan Symantec Trojan.StartPage.895
Download.Trojan Symantec Trojan.MulDrop.978
Download.Trojan Symantec Trojan.DownLoader.20480
Download.Trojan Symantec Trojan.DownLoader.1435
Download.Trojan Symantec Trojan.PWS.Krepper
Download.Trojan Symantec Trojan.DownLoader.848
Download.Trojan Symantec Trojan.DownLoader.4985
Download.Trojan Symantec Trojan.DownLoader.2205
Download.Trojan Symantec Trojan.DownLoader.918
Download.Trojan Symantec BackDoor.Mutny
Download.Trojan Symantec Trojan.WebDL.10
Download.Trojan Symantec Trojan.DownLoader.2144
Download.Trojan Symantec Trojan.DownLoader.1962
Download.Trojan Symantec Trojan.MulDrop.1669
Download.Trojan Symantec Trojan.Click.238
Download.Trojan Symantec Trojan.MulDrop.1772
Download.Trojan Symantec Trojan.DownLoader.1082
Download.Trojan Symantec Trojan.MulDrop.2624
Download.Trojan Symantec Trojan.DownLoader.167
Download.Trojan Symantec Trojan.MulDrop.1063
Download.Trojan Symantec Trojan.DownLoader.437
Download.Trojan Symantec Trojan.MulDrop.806
Download.Trojan Symantec Trojan.MulDrop.2694
Download.Trojan Symantec Trojan.MulDrop.2513
Download.Trojan Symantec Trojan.DownLoader.4469
Download.Trojan Symantec Trojan.DownLoader.3823
Download.Trojan Symantec Trojan.DownLoader.540

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.