Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.4184
Download.Trojan Symantec Trojan.DownLoader.4875
Download.Trojan Symantec Trojan.DownLoader.3882
Download.Trojan Symantec Trojan.DownLoader.3735
Download.Trojan Symantec Trojan.DownLoader.3943
Download.Trojan Symantec Trojan.Gezidown
Download.Trojan Symantec Trojan.DownLoader.3208
Download.Trojan Symantec Trojan.DownLoader.2677
Download.Trojan Symantec Trojan.DownLoader.2785
Download.Trojan Symantec Trojan.DownLoader.2521
Download.Trojan Symantec Trojan.DownLoader.26112
Download.Trojan Symantec Trojan.DownLoader.2131
Download.Trojan Symantec Trojan.DownLoader.1776
Download.Trojan Symantec Trojan.DownLoader.1095
Download.Trojan Symantec Trojan.DownLoader.1223
Download.Trojan Symantec Trojan.DownLoader.1192
Download.Trojan Symantec Trojan.DownLoader.1222
Download.Trojan Symantec Trojan.DownLoader.1216
Download.Trojan Symantec Trojan.DownLoader.2790
Download.Trojan Symantec Trojan.DownLoader.1877
Download.Trojan Symantec Trojan.DownLoader.3993
Download.Trojan Symantec Trojan.DownLoader.594
Download.Trojan Symantec Trojan.DownLoader.1301
Download.Trojan Symantec Trojan.DownLoader.4185
Download.Trojan Symantec Trojan.DownLoader.455
Download.Trojan Symantec Trojan.PWS.Banker.819
Download.Trojan Symantec Trojan.DownLoader.4363
Download.Trojan Symantec Adware.Quilt
Download.Trojan Symantec Trojan.DownLoader.4176
Download.Trojan Symantec Trojan.DownLoader.4001
Download.Trojan Symantec Trojan.DownLoader.3818
Download.Trojan Symantec Trojan.DownLoader.5182
Download.Trojan Symantec Trojan.DownLoader.3802
Download.Trojan Symantec Trojan.DownLoader.3803
Download.Trojan Symantec Trojan.DownLoader.3804
Download.Trojan Symantec Trojan.DownLoader.4304
Download.Trojan Symantec Trojan.DownLoader.4908
Download.Trojan Symantec Trojan.DownLoader.4011
Download.Trojan Symantec Trojan.DownLoader.3564
Download.Trojan Symantec Trojan.DownLoader.3529
Download.Trojan Symantec Trojan.DownLoader.3530
Download.Trojan Symantec Trojan.DownLoader.3892
Download.Trojan Symantec Trojan.DownLoader.5140
Download.Trojan Symantec Trojan.DownLoader.3793
Download.Trojan Symantec Trojan.DownLoader.3693
Download.Trojan Symantec Trojan.PWS.Banker.885
Download.Trojan Symantec Trojan.DownLoader.5146
Download.Trojan Symantec Trojan.DownLoader.5144
Download.Trojan Symantec Trojan.PWS.Banker.853
Download.Trojan Symantec Trojan.DownLoader.3350

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.