Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Trojan.StartPage.912
Downloader.Trojan Symantec Trojan.DownLoader.4152
Downloader.Trojan Symantec Trojan.MulDrop.2911
Downloader.Trojan Symantec Trojan.DownLoader.3868
Downloader.Trojan Symantec Trojan.DownLoader.4411
Downloader.Trojan Symantec Trojan.DownLoader.4517
Downloader.Trojan Symantec Trojan.DownLoader.3756
Downloader.Trojan Symantec Trojan.StamLoader
Downloader.Trojan Symantec Dialer.Sporn
Downloader.Trojan Symantec Trojan.DownLoader.3758
Downloader.Trojan Symantec Trojan.DownLoader.4539
Downloader.Trojan Symantec Trojan.DownLoader.4462
Downloader.Trojan Symantec Trojan.DownLoader.3127
Downloader.Trojan Symantec Trojan.DownLoader.2900
Downloader.Trojan Symantec Trojan.DownLoader.3459
Downloader.Trojan Symantec Trojan.DownLoader.3493
Downloader.Trojan Symantec Trojan.DownLoader.3874
Downloader.Trojan Symantec Trojan.DownLoader.3617
Downloader.Trojan Symantec Trojan.DownLoader.4026
Downloader.Trojan Symantec Trojan.MulDrop.2993
Downloader.Trojan Symantec Trojan.DownLoader.3757
Downloader.Trojan Symantec Trojan.DownLoader.2038
Downloader.Trojan Symantec Trojan.DownLoader.320
Downloader.Trojan Symantec Trojan.DownLoader.3193
Downloader.Trojan Symantec Trojan.DownLoader.3129
Downloader.Trojan Symantec Trojan.DownLoader.3718
Downloader.Trojan Symantec Trojan.StartPage.738
Downloader.Trojan Symantec Trojan.DownLoader.3461
Downloader.Trojan Symantec Trojan.DownLoader.2625
Downloader.Trojan Symantec Trojan.DownLoader.610
Downloader.Trojan Symantec Trojan.DownLoader.2656
Downloader.Trojan Symantec Trojan.StartPage.656
Downloader.Trojan Symantec Trojan.DownLoader.793
Downloader.Trojan Symantec Trojan.DownLoader.1899
Downloader.Trojan Symantec Trojan.DownLoader.268
Downloader.Trojan Symantec Trojan.DownLoader.2529
Downloader.Trojan Symantec Trojan.PWS.Legmir.207
Downloader.Trojan Symantec Trojan.DownLoader.321
Downloader.Trojan Symantec Trojan.DownLoader.342
Downloader.Trojan Symantec Trojan.DownLoader.6656
Downloader.Trojan Symantec Trojan.DownLoader.3517
Downloader.Trojan Symantec Trojan.Skoob
Downloader.Trojan Symantec Trojan.ZGet.2
Downloader.Trojan Symantec Trojan.DownLoader.1041
Downloader.Trojan Symantec Trojan.DownLoader.1081
Downloader.Trojan Symantec Trojan.DownLoader.1264
Downloader.Trojan Symantec Win32.HLLP.Cako.28691
Downloader.Trojan Symantec Trojan.DownLoader.2293
Downloader.Trojan Symantec Trojan.DownLoader.3255
Downloader.Trojan Symantec Trojan.Dycic

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.