Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.300
Download.Trojan Symantec Trojan.DownLoader.2685
Download.Trojan Symantec Trojan.DownLoader.2899
Download.Trojan Symantec Trojan.Proxy.533
Download.Trojan Symantec Trojan.DownLoader.2163
Download.Trojan Symantec Trojan.DownLoader.12288
Download.Trojan Symantec Trojan.DownLoader.952
Download.Trojan Symantec Trojan.Hino
Download.Trojan Symantec Trojan.DownLoader.6029
Download.Trojan Symantec Trojan.DownLoader.6342
Download.Trojan Symantec Trojan.DownLoader.4805
Download.Trojan Symantec Trojan.DownLoader.6390
Download.Trojan Symantec Trojan.DownLoader.6094
Download.Trojan Symantec Trojan.DownLoader.6491
Download.Trojan Symantec Trojan.DownLoader.5967
Download.Trojan Symantec Trojan.DownLoader.5797
Download.Trojan Symantec Trojan.DownLoader.5988
Download.Trojan Symantec Trojan.DownLoader.5975
Download.Trojan Symantec Trojan.DownLoader.5872
Download.Trojan Symantec Trojan.DownLoader.5876
Download.Trojan Symantec Trojan.DownLoader.5788
Download.Trojan Symantec Trojan.DownLoader.5799
Download.Trojan Symantec Trojan.DownLoader.5826
Download.Trojan Symantec Trojan.DownLoader.5575
Download.Trojan Symantec Trojan.DownLoader.5557
Download.Trojan Symantec Trojan.DownLoader.5567
Download.Trojan Symantec Trojan.DownLoader.5423
Download.Trojan Symantec Trojan.MulDrop.3063
Download.Trojan Symantec Trojan.DownLoader.5550
Download.Trojan Symantec Trojan.DownLoader.5590
Download.Trojan Symantec Trojan.DownLoader.5561
Download.Trojan Symantec Trojan.DownLoader.5669
Download.Trojan Symantec Trojan.DownLoader.5654
Download.Trojan Symantec Trojan.DownLoader.5728
Download.Trojan Symantec Trojan.DownLoader.5331
Download.Trojan Symantec Trojan.DownLoader.5255
Download.Trojan Symantec Trojan.DownLoader.5377
Download.Trojan Symantec Trojan.DownLoader.5329
Download.Trojan Symantec Trojan.DownLoader.5199
Download.Trojan Symantec BackDoor.Generic.1024
Download.Trojan Symantec Trojan.DownLoader.6467
Download.Trojan Symantec Win32.HLLW.Generic.136
Download.Trojan Symantec Trojan.DownLoader.5084
Download.Trojan Symantec Trojan.DownLoader.5203
Download.Trojan Symantec Trojan.DownLoader.5047
Download.Trojan Symantec Trojan.DownLoader.5063
Download.Trojan Symantec Trojan.DownLoader.4833
Download.Trojan Symantec Trojan.DownLoader.4610
Download.Trojan Symantec Trojan.Popuper
Download.Trojan Symantec Trojan.Isbar.240

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.