Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Trojan.DownLoader.4315
Downloader.Trojan Symantec BackDoor.WebDor
Downloader.Trojan Symantec Trojan.DownLoader.3375
Downloader.Trojan Symantec Trojan.DownLoader.4761
Downloader.Trojan Symantec Trojan.MulDrop.1386
Downloader.Trojan Symantec Trojan.DownLoader.1912
Downloader.Trojan Symantec Trojan.DownLoader.1169
Downloader.Trojan Symantec Trojan.DownLoader.3830
Downloader.Trojan Symantec Trojan.DownLoader.1196
Downloader.Trojan Symantec Trojan.DownLoader.1669
Downloader.Trojan Symantec Trojan.DownLoader.1239
Downloader.Trojan Symantec Trojan.DownLoader.1455
Downloader.Trojan Symantec Trojan.DownLoader.1073
Downloader.Trojan Symantec Trojan.Scagent
Downloader.Trojan Symantec Trojan.DownLoader.926
Downloader.Trojan Symantec Trojan.DownLoader.448
Downloader.Trojan Symantec Trojan.DownLoader.757
Downloader.Trojan Symantec Trojan.DownLoader.750
Downloader.Trojan Symantec Trojan.DownLoader.641
Downloader.Trojan Symantec BackDoor.Afcore.27
Downloader.Trojan Symantec Trojan.DownLoader.633
Downloader.Trojan Symantec Trojan.DownLoader.799
Downloader.Trojan Symantec Trojan.DownLoader.571
Downloader.Trojan Symantec Trojan.DownLoader.981
Downloader.Trojan Symantec Trojan.DownLoader.6106
Downloader.Trojan Symantec Trojan.DownLoader.6156
Downloader.Trojan Symantec Trojan.DownLoader.5854
Downloader.Trojan Symantec Trojan.DownLoader.6030
Downloader.Trojan Symantec Trojan.DownLoader.6070
Downloader.Trojan Symantec Trojan.DownLoader.5327
Downloader.Trojan Symantec Trojan.DownLoader.5574
Downloader.Trojan Symantec Trojan.MulDrop.3106
Downloader.Trojan Symantec Trojan.DownLoader.5809
Downloader.Trojan Symantec Trojan.DownLoader.4721
Downloader.Trojan Symantec Trojan.DownLoader.5280
Downloader.Trojan Symantec Trojan.DownLoader.5823
Downloader.Trojan Symantec Trojan.DownLoader.5269
Downloader.Trojan Symantec Trojan.DownLoader.4827
Downloader.Trojan Symantec Trojan.DownLoader.4389
Downloader.Trojan Symantec Trojan.DownLoader.5004
Downloader.Trojan Symantec Trojan.DownLoader.4837
Downloader.Trojan Symantec Trojan.Feat.7
Downloader.Trojan Symantec Trojan.DownLoader.5125
Downloader.Trojan Symantec Trojan.DownLoader.4452
Downloader.Trojan Symantec Trojan.DownLoader.4272
Downloader.Trojan Symantec Trojan.DownLoader.3245
Downloader.Trojan Symantec Trojan.MulDrop.2024
Downloader.Trojan Symantec Trojan.DownLoader.4226
Downloader.Trojan Symantec Trojan.DownLoader.4225
Downloader.Trojan Symantec Trojan.DownLoader.1036

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies