Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.Ketch
Download.Trojan Symantec BackDoor.Besmon
Download.Trojan Symantec Trojan.DownLoader.4437
Download.Trojan Symantec Trojan.DownLoader.3310
Download.Trojan Symantec Trojan.DownLoader.3837
Download.Trojan Symantec Trojan.DownLoader.4804
Download.Trojan Symantec Trojan.DownLoader.3630
Download.Trojan Symantec Trojan.DownLoader.4422
Download.Trojan Symantec Trojan.DownLoader.4642
Download.Trojan Symantec Trojan.DownLoader.4690
Download.Trojan Symantec Trojan.DownLoader.3968
Download.Trojan Symantec Trojan.DownLoader.3363
Download.Trojan Symantec Trojan.DownLoader.3510
Download.Trojan Symantec Trojan.DownLoader.3731
Download.Trojan Symantec Trojan.DownLoader.3734
Download.Trojan Symantec Trojan.DownLoader.3884
Download.Trojan Symantec Trojan.DownLoader.5405
Download.Trojan Symantec Trojan.DownLoader.4159
Download.Trojan Symantec Trojan.DownLoader.3264
Download.Trojan Symantec Trojan.DownLoader.3506
Download.Trojan Symantec Trojan.DownLoader.4976
Download.Trojan Symantec Trojan.DownLoader.3545
Download.Trojan Symantec Trojan.DownLoader.5656
Download.Trojan Symantec Trojan.DownLoader.4815
Download.Trojan Symantec Trojan.DownLoader.4816
Download.Trojan Symantec Trojan.DownLoader.4500
Download.Trojan Symantec Win32.HLLM.Netsky.61984
Download.Trojan Symantec Win32.HLLM.Netsky
Download.Trojan Symantec Trojan.DownLoader.2102
Download.Trojan Symantec Win32.Beavis.5632
Download.Trojan Symantec Trojan.DownLoader.3958
Download.Trojan Symantec Trojan.DownLoader.3684
Download.Trojan Symantec Trojan.Nucdown.101
Download.Trojan Symantec Trojan.DownLoader.3519
Download.Trojan Symantec Trojan.MulDrop.1670
Download.Trojan Symantec Trojan.PWS.Kirk
Download.Trojan Symantec Trojan.DownLoader.4022
Download.Trojan Symantec Trojan.DownLoader.4038
Download.Trojan Symantec Trojan.MulDrop.586
Download.Trojan Symantec Trojan.DownLoader.1516
Download.Trojan Symantec Trojan.DownLoader.2137
Download.Trojan Symantec Trojan.Seeker.97
Download.Trojan Symantec Trojan.DownLoader.690
Download.Trojan Symantec Trojan.Bikiwi
Download.Trojan Symantec Exploit.MS05-053
Download.Trojan Symantec Trojan.MulDrop.1258
Download.Trojan Symantec Trojan.DownLoader.748
Download.Trojan Symantec Trojan.Proxy.106
Download.Trojan Symantec Win32.HLLW.Lextas
Download.Trojan Symantec Trojan.Seeker.96

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.