Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.6072
Download.Trojan Symantec Trojan.DownLoader.5906
Download.Trojan Symantec Trojan.DownLoader.6126
Download.Trojan Symantec Trojan.DownLoader.5689
Download.Trojan Symantec Trojan.DownLoader.941
Download.Trojan Symantec Trojan.DownLoader.5775
Download.Trojan Symantec Trojan.DownLoader.6071
Download.Trojan Symantec Trojan.DownLoader.5499
Download.Trojan Symantec Trojan.MulDrop.3054
Download.Trojan Symantec Trojan.DownLoader.5224
Download.Trojan Symantec Trojan.DownLoader.5798
Download.Trojan Symantec Trojan.DownLoader.5772
Download.Trojan Symantec Trojan.DownLoader.5874
Download.Trojan Symantec Trojan.DownLoader.5784
Download.Trojan Symantec Trojan.DownLoader.5812
Download.Trojan Symantec Trojan.MulDrop.3090
Download.Trojan Symantec Trojan.DownLoader.5709
Download.Trojan Symantec Trojan.DownLoader.5721
Download.Trojan Symantec Trojan.DownLoader.6198
Download.Trojan Symantec Trojan.DownLoader.5568
Download.Trojan Symantec Trojan.Webdown.2
Download.Trojan Symantec Trojan.DownLoader.5521
Download.Trojan Symantec Trojan.DownLoader.5495
Download.Trojan Symantec Trojan.DownLoader.5534
Download.Trojan Symantec Trojan.DownLoader.5515
Download.Trojan Symantec Trojan.DownLoader.5331
Download.Trojan Symantec Trojan.DownLoader.5255
Download.Trojan Symantec Trojan.DownLoader.5377
Download.Trojan Symantec Trojan.DownLoader.5329
Download.Trojan Symantec Trojan.DownLoader.5264
Download.Trojan Symantec Trojan.DownLoader.5190
Download.Trojan Symantec Trojan.Proxy.281
Download.Trojan Symantec Trojan.DownLoader.3787
Download.Trojan Symantec Trojan.DownLoader.5044
Download.Trojan Symantec Trojan.DownLoader.5065
Download.Trojan Symantec Trojan.DownLoader.5157
Download.Trojan Symantec Trojan.DownLoader.4889
Download.Trojan Symantec Trojan.DownLoader.4855
Download.Trojan Symantec Trojan.DownLoader.4878
Download.Trojan Symantec Trojan.DownLoader.4860
Download.Trojan Symantec Trojan.DownLoader.5048
Download.Trojan Symantec Trojan.DownLoader.3532
Download.Trojan Symantec Trojan.DownLoader.5035
Download.Trojan Symantec Trojan.DownLoader.5032
Download.Trojan Symantec Trojan.DownLoader.2799
Download.Trojan Symantec Trojan.DownLoader.3862
Download.Trojan Symantec Trojan.DownLoader.5014
Download.Trojan Symantec Trojan.DownLoader.4900
Download.Trojan Symantec Trojan.DownLoader.4896
Download.Trojan Symantec Trojan.DownLoader.4904

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.