Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.3549
Download.Trojan Symantec Trojan.DownLoader.5285
Download.Trojan Symantec Trojan.DownLoader.5339
Download.Trojan Symantec Trojan.DownLoader.5073
Download.Trojan Symantec Trojan.DownLoader.3460
Download.Trojan Symantec Trojan.DownLoader.4192
Download.Trojan Symantec Trojan.DownLoader.4485
Download.Trojan Symantec Trojan.DownLoader.4742
Download.Trojan Symantec Trojan.DownLoader.4866
Download.Trojan Symantec Trojan.DownLoader.4464
Download.Trojan Symantec Trojan.DownLoader.4489
Download.Trojan Symantec Trojan.DownLoader.3474
Download.Trojan Symantec Trojan.DownLoader.2685
Download.Trojan Symantec Trojan.DownLoader.2899
Download.Trojan Symantec Trojan.DownLoader.3947
Download.Trojan Symantec Trojan.DownLoader.545
Download.Trojan Symantec Trojan.Relax
Download.Trojan Symantec Trojan.DownLoader.1759
Download.Trojan Symantec Trojan.DownLoader.2454
Download.Trojan Symantec Trojan.DownLoader.2634
Download.Trojan Symantec Trojan.DownLoader.2637
Download.Trojan Symantec Trojan.DownLoader.2018
Download.Trojan Symantec Trojan.DownLoader.2143
Download.Trojan Symantec Trojan.DownLoader.17736
Download.Trojan Symantec Trojan.DownLoader.1536
Download.Trojan Symantec Trojan.DownLoader.2174
Download.Trojan Symantec Trojan.DownLoader.2198
Download.Trojan Symantec Trojan.DownLoader.1257
Download.Trojan Symantec Trojan.DownLoader.2689
Download.Trojan Symantec Trojan.DownLoader.1277
Download.Trojan Symantec Trojan.DownLoader.1793
Download.Trojan Symantec Trojan.DownLoader.2388
Download.Trojan Symantec Trojan.Proxy.533
Download.Trojan Symantec Trojan.DownLoader.2163
Download.Trojan Symantec Trojan.DownLoader.1708
Download.Trojan Symantec Trojan.DownLoader.973
Download.Trojan Symantec Trojan.DownLoader.2678
Download.Trojan Symantec Trojan.Mbiz
Download.Trojan Symantec Trojan.DownLoader.1384
Download.Trojan Symantec Trojan.DownLoader.1278
Download.Trojan Symantec Trojan.DownLoader.1688
Download.Trojan Symantec Trojan.DownLoader.1931
Download.Trojan Symantec Trojan.DownLoader.1591
Download.Trojan Symantec Trojan.StartPage.372
Download.Trojan Symantec Trojan.DownLoader.1431
Download.Trojan Symantec Trojan.DownLoader.1323
Download.Trojan Symantec Trojan.DownLoader.1265
Download.Trojan Symantec Trojan.DownLoader.1674
Download.Trojan Symantec Trojan.MulDrop.1338
Download.Trojan Symantec Trojan.DownLoader.1410

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.