Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.3237
Download.Trojan Symantec Trojan.DownLoader.1280
Download.Trojan Symantec Trojan.DownLoader.1666
Download.Trojan Symantec Trojan.DownLoader.995
Download.Trojan Symantec Trojan.DownLoader.1312
Download.Trojan Symantec Trojan.DownLoader.1293
Download.Trojan Symantec Trojan.DownLoader.1501
Download.Trojan Symantec Trojan.MulDrop.379
Download.Trojan Symantec Trojan.DownLoader.6352
Download.Trojan Symantec Trojan.DownLoader.510
Download.Trojan Symantec Trojan.DownLoader.792
Download.Trojan Symantec Trojan.DownLoader.1098
Download.Trojan Symantec Trojan.DownLoader.1256
Download.Trojan Symantec Trojan.MulDrop.1413
Download.Trojan Symantec Trojan.DownLoader.1034
Download.Trojan Symantec Trojan.DownLoader.667
Download.Trojan Symantec Trojan.DownLoader.2604
Download.Trojan Symantec Trojan.DownLoader.3158
Download.Trojan Symantec Trojan.DownLoader.1229
Download.Trojan Symantec Trojan.DownLoader.1135
Download.Trojan Symantec Trojan.DownLoader.1176
Download.Trojan Symantec Trojan.DownLoader.851
Download.Trojan Symantec Trojan.DownLoader.1118
Download.Trojan Symantec Trojan.DownLoader.3197
Download.Trojan Symantec Trojan.DownLoader.966
Download.Trojan Symantec Trojan.DownLoader.4499
Download.Trojan Symantec Trojan.DownLoader.2443
Download.Trojan Symantec Trojan.MulDrop.2069
Download.Trojan Symantec Trojan.DownLoader.2364
Download.Trojan Symantec Trojan.DownLoader.963
Download.Trojan Symantec Trojan.Slime
Download.Trojan Symantec Trojan.DownLoader.4376
Download.Trojan Symantec Trojan.Salite
Download.Trojan Symantec Trojan.Sandesa.15
Download.Trojan Symantec Trojan.DownLoader.430
Download.Trojan Symantec Trojan.LowZones
Download.Trojan Symantec Trojan.DownLoader.3167
Download.Trojan Symantec Trojan.DownLoader.3232
Download.Trojan Symantec Trojan.Psyphen.10
Download.Trojan Symantec Trojan.DownLoader.1579
Download.Trojan Symantec Trojan.DownLoader.3272
Download.Trojan Symantec Trojan.DownLoader.4198
Download.Trojan Symantec Trojan.DownLoader.3848
Download.Trojan Symantec Trojan.Aphex.23
Download.Trojan Symantec Trojan.Aphex.30
Download.Trojan Symantec Trojan.Mafia.12
Download.Trojan Symantec Trojan.DownLoader.5191
Download.Trojan Symantec Trojan.DownLoader.2541
Download.Trojan Symantec Trojan.MulDrop.2307
Download.Trojan Symantec Trojan.DownLoader.226

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.