Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.4048
Download.Trojan Symantec Trojan.MulDrop.1512
Download.Trojan Symantec Trojan.MulDrop.2700
Download.Trojan Symantec Trojan.DownLoader.3870
Download.Trojan Symantec Trojan.DownLoader.4116
Download.Trojan Symantec Trojan.DownLoader.1725
Download.Trojan Symantec Trojan.DownLoader.440
Download.Trojan Symantec Trojan.DownLoader.3984
Download.Trojan Symantec Trojan.Click.649
Download.Trojan Symantec Trojan.Proxy.442
Download.Trojan Symantec Trojan.StamLoader
Download.Trojan Symantec Trojan.DownLoader.1315
Download.Trojan Symantec Trojan.DownLoader.2029
Download.Trojan Symantec Trojan.DownLoader.2523
Download.Trojan Symantec Trojan.DownLoader.3858
Download.Trojan Symantec Trojan.DownLoader.2722
Download.Trojan Symantec Trojan.DownLoader.580
Download.Trojan Symantec Trojan.DownLoader.3153
Download.Trojan Symantec Trojan.DownLoader.5312
Download.Trojan Symantec Trojan.DownLoader.4520
Download.Trojan Symantec Trojan.DownLoader.5252
Download.Trojan Symantec Trojan.DownLoader.3795
Download.Trojan Symantec Trojan.DownLoader.5383
Download.Trojan Symantec Trojan.DownLoader.3799
Download.Trojan Symantec Trojan.DownLoader.401
Download.Trojan Symantec Trojan.DownLoader.60928
Download.Trojan Symantec Trojan.DownLoader.402
Download.Trojan Symantec Trojan.DownLoader.3766
Download.Trojan Symantec Trojan.Click.732
Download.Trojan Symantec Trojan.Click.755
Download.Trojan Symantec Trojan.Hasum
Download.Trojan Symantec Trojan.DownLoader.3496
Download.Trojan Symantec Trojan.DownLoader.3739
Download.Trojan Symantec Trojan.DownLoader.3748
Download.Trojan Symantec Trojan.DownLoader.3623
Download.Trojan Symantec Trojan.DownLoader.3491
Download.Trojan Symantec Trojan.DownLoader.3617
Download.Trojan Symantec Trojan.DownLoader.3939
Download.Trojan Symantec Trojan.DownLoader.3107
Download.Trojan Symantec Trojan.DownLoader.4024
Download.Trojan Symantec Trojan.DownLoader.3330
Download.Trojan Symantec Trojan.DownLoader.3397
Download.Trojan Symantec Trojan.DownLoader.807
Download.Trojan Symantec Trojan.DownLoader.3356
Download.Trojan Symantec Trojan.DownLoader.2710
Download.Trojan Symantec Trojan.DownLoader.3405
Download.Trojan Symantec Trojan.DownLoader.3269
Download.Trojan Symantec Trojan.DownLoader.3133
Download.Trojan Symantec Trojan.DownLoader.3758
Download.Trojan Symantec Trojan.DownLoader.3293

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.