Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.6219
Download.Trojan Symantec Trojan.DownLoader.5895
Download.Trojan Symantec Trojan.DownLoader.4892
Download.Trojan Symantec Trojan.DownLoader.5891
Download.Trojan Symantec Trojan.DownLoader.5522
Download.Trojan Symantec Trojan.DownLoader.5355
Download.Trojan Symantec Trojan.DownLoader.4808
Download.Trojan Symantec Trojan.DownLoader.4794
Download.Trojan Symantec Trojan.DownLoader.1277
Download.Trojan Symantec Trojan.DownLoader.1793
Download.Trojan Symantec Trojan.DownLoader.2388
Download.Trojan Symantec Trojan.Proxy.533
Download.Trojan Symantec Trojan.DownLoader.2163
Download.Trojan Symantec Trojan.DownLoader.1305
Download.Trojan Symantec Trojan.DownLoader.902
Download.Trojan Symantec Trojan.Prutec
Download.Trojan Symantec Trojan.DownLoader.1281
Download.Trojan Symantec Trojan.DownLoader.657
Download.Trojan Symantec Trojan.DownLoader.739
Download.Trojan Symantec Trojan.MulDrop.3119
Download.Trojan Symantec Trojan.DownLoader.481
Download.Trojan Symantec Adware.Diado
Download.Trojan Symantec Trojan.Isbar
Download.Trojan Symantec Trojan.MulDrop.207
Download.Trojan Symantec Trojan.Kaotan
Download.Trojan Symantec Trojan.DownLoader.6493
Download.Trojan Symantec Trojan.DownLoader.6500
Download.Trojan Symantec Trojan.DownLoader.6442
Download.Trojan Symantec Trojan.DownLoader.6492
Download.Trojan Symantec Trojan.DownLoader.6518
Download.Trojan Symantec Trojan.DownLoader.5782
Download.Trojan Symantec Trojan.DownLoader.5458
Download.Trojan Symantec Trojan.DownLoader.6139
Download.Trojan Symantec Trojan.DownLoader.5879
Download.Trojan Symantec Trojan.DownLoader.5943
Download.Trojan Symantec Trojan.DownLoader.5863
Download.Trojan Symantec Trojan.DownLoader.6177
Download.Trojan Symantec Trojan.DownLoader.6124
Download.Trojan Symantec Trojan.DownLoader.6088
Download.Trojan Symantec Trojan.DownLoader.6188
Download.Trojan Symantec Trojan.DownLoader.6491
Download.Trojan Symantec Trojan.DownLoader.5967
Download.Trojan Symantec Trojan.DownLoader.5797
Download.Trojan Symantec Trojan.DownLoader.5988
Download.Trojan Symantec Trojan.DownLoader.5975
Download.Trojan Symantec Trojan.DownLoader.5910
Download.Trojan Symantec Trojan.DownLoader.5909
Download.Trojan Symantec Trojan.DownLoader.5913
Download.Trojan Symantec Trojan.PWS.Banker.1406
Download.Trojan Symantec Trojan.DownLoader.5736

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.