Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.1218
Download.Trojan Symantec Trojan.DownLoader.694
Download.Trojan Symantec Trojan.DownLoader.1131
Download.Trojan Symantec Trojan.DownLoader.2506
Download.Trojan Symantec Trojan.Proxy.572
Download.Trojan Symantec Trojan.MulDrop.2723
Download.Trojan Symantec Trojan.DownLoader.4544
Download.Trojan Symantec Trojan.MulDrop.2707
Download.Trojan Symantec Trojan.DownLoader.2727
Download.Trojan Symantec Trojan.DownLoader.3044
Download.Trojan Symantec Program.PrcView.3621
Download.Trojan Symantec Trojan.DownLoader.2007
Download.Trojan Symantec Trojan.DownLoader.3697
Download.Trojan Symantec Trojan.MulDrop.2862
Download.Trojan Symantec Trojan.DownLoader.3012
Download.Trojan Symantec Trojan.DownLoader.1463
Download.Trojan Symantec Trojan.MulDrop.908
Download.Trojan Symantec Trojan.MulDrop.729
Download.Trojan Symantec Trojan.DownLoader.3879
Download.Trojan Symantec Trojan.MulDrop.2703
Download.Trojan Symantec Trojan.DownLoader.5591
Download.Trojan Symantec Trojan.PWS.Banker.599
Download.Trojan Symantec Trojan.Proxy.83
Download.Trojan Symantec Trojan.DownLoader.5821
Download.Trojan Symantec Exploit.IewinBO
Download.Trojan Symantec Exploit.CAN2005-1790
Download.Trojan Symantec Trojan.MulDrop.2585
Download.Trojan Symantec Trojan.DownLoader.4756
Download.Trojan Symantec Trojan.MulDrop.2605
Download.Trojan Symantec Trojan.DownLoader.37376
Download.Trojan Symantec Trojan.DownLoader.767
Download.Trojan Symantec Trojan.DownLoader.302
Download.Trojan Symantec Trojan.DownLoader.343
Download.Trojan Symantec Trojan.DownLoader.367
Download.Trojan Symantec Trojan.DownLoader.5339
Download.Trojan Symantec Trojan.DownLoader.5073
Download.Trojan Symantec Trojan.DownLoader.3460
Download.Trojan Symantec Trojan.DownLoader.4192
Download.Trojan Symantec Trojan.DownLoader.4485
Download.Trojan Symantec Trojan.DownLoader.2634
Download.Trojan Symantec Trojan.DownLoader.2637
Download.Trojan Symantec Trojan.Proxy.533
Download.Trojan Symantec Trojan.DownLoader.2163
Download.Trojan Symantec Trojan.DownLoader.4139
Download.Trojan Symantec Trojan.DownLoader.989
Download.Trojan Symantec Trojan.DownLoader.1110
Download.Trojan Symantec Trojan.DownLoader.1075
Download.Trojan Symantec Trojan.Meman
Download.Trojan Symantec Trojan.Isbar
Download.Trojan Symantec Trojan.MulDrop.207

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.