Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.PWS.Banker.1165
Download.Trojan Symantec Trojan.DownLoader.5030
Download.Trojan Symantec Trojan.DownLoader.4942
Download.Trojan Symantec Trojan.DownLoader.5419
Download.Trojan Symantec Trojan.DownLoader.4966
Download.Trojan Symantec Trojan.DownLoader.4687
Download.Trojan Symantec Trojan.DownLoader.5027
Download.Trojan Symantec Trojan.DownLoader.4645
Download.Trojan Symantec Trojan.DownLoader.4512
Download.Trojan Symantec Trojan.DownLoader.3868
Download.Trojan Symantec Trojan.Nucdown.101
Download.Trojan Symantec Trojan.MulDrop.586
Download.Trojan Symantec Trojan.SmokeDown
Download.Trojan Symantec Exploit.LinkRun
Download.Trojan Symantec Trojan.SmokeDown.11
Download.Trojan Symantec Trojan.DownLoader.2612
Download.Trojan Symantec Exploit.MS05-053
Download.Trojan Symantec BackDoor.Generic.511
Download.Trojan Symantec Trojan.Zombie.2
Download.Trojan Symantec Trojan.ZombPrat
Download.Trojan Symantec Trojan.DownLoader.3721
Download.Trojan Symantec Trojan.Anvir
Download.Trojan Symantec Trojan.MulDrop.2855
Download.Trojan Symantec Trojan.PWS.Banker.755
Download.Trojan Symantec Trojan.DownLoader.3214
Download.Trojan Symantec Trojan.DownLoader.3366
Download.Trojan Symantec Trojan.DownLoader.856
Download.Trojan Symantec Trojan.StartPage.116
Download.Trojan Symantec Trojan.Inject
Download.Trojan Symantec Trojan.DownLoader.3825
Download.Trojan Symantec Trojan.Ranky
Download.Trojan Symantec Trojan.PWS.Agu
Download.Trojan Symantec Trojan.Proxy.227
Download.Trojan Symantec Trojan.Proxy.69
Download.Trojan Symantec Trojan.DownLoader.1435
Download.Trojan Symantec Trojan.Click.238
Download.Trojan Symantec Trojan.MulDrop.1772
Download.Trojan Symantec Trojan.DownLoader.1082
Download.Trojan Symantec Trojan.MulDrop.2624
Download.Trojan Symantec Trojan.DownLoader.437
Download.Trojan Symantec Trojan.MulDrop.2694
Download.Trojan Symantec Trojan.MulDrop.2236
Download.Trojan Symantec Trojan.ZGet.7640
Download.Trojan Symantec Trojan.WinShow
Download.Trojan Symantec Trojan.MulDrop.2765
Download.Trojan Symantec Trojan.DownLoader.853
Download.Trojan Symantec Trojan.DownLoader.890
Download.Trojan Symantec Trojan.DownLoader.875
Download.Trojan Symantec Trojan.DownLoader.408
Download.Trojan Symantec Trojan.DownLoader.1520

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.