Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Trojan.DownLoader.3406
Downloader.Trojan Symantec Trojan.DownLoader.3532
Downloader.Trojan Symantec Trojan.DownLoader.4133
Downloader.Trojan Symantec Trojan.DownLoader.3273
Downloader.Trojan Symantec Trojan.DownLoader.3888
Downloader.Trojan Symantec Trojan.DownLoader.3562
Downloader.Trojan Symantec BackDoor.Generic.953
Downloader.Trojan Symantec Trojan.DownLoader.36864
Downloader.Trojan Symantec Trojan.DownLoader.3328
Downloader.Trojan Symantec Trojan.DownLoader.1070
Downloader.Trojan Symantec Trojan.DownLoader.802
Downloader.Trojan Symantec Trojan.DownLoader.2437
Downloader.Trojan Symantec Trojan.DownLoader.1114
Downloader.Trojan Symantec Trojan.MulDrop.1533
Downloader.Trojan Symantec Trojan.DownLoader.465
Downloader.Trojan Symantec Trojan.DownLoader.339
Downloader.Trojan Symantec Trojan.DownLoader.2444
Downloader.Trojan Symantec Trojan.DownLoader.4652
Downloader.Trojan Symantec Trojan.DownLoader.4291
Downloader.Trojan Symantec Trojan.DownLoader.4287
Downloader.Trojan Symantec Trojan.DownLoader.4474
Downloader.Trojan Symantec Trojan.DownLoader.4140
Downloader.Trojan Symantec Trojan.DownLoader.6080
Downloader.Trojan Symantec Trojan.DownLoader.4753
Downloader.Trojan Symantec Trojan.DownLoader.6432
Downloader.Trojan Symantec Trojan.DownLoader.4019
Downloader.Trojan Symantec Trojan.DownLoader.4581
Downloader.Trojan Symantec Trojan.DownLoader.4200
Downloader.Trojan Symantec Trojan.Click.691
Downloader.Trojan Symantec Trojan.DownLoader.5057
Downloader.Trojan Symantec Trojan.DownLoader.4145
Downloader.Trojan Symantec Trojan.Click.613
Downloader.Trojan Symantec Trojan.DownLoader.5185
Downloader.Trojan Symantec Trojan.DownLoader.3411
Downloader.Trojan Symantec Trojan.DownLoader.3456
Downloader.Trojan Symantec Trojan.DownLoader.3421
Downloader.Trojan Symantec Trojan.DownLoader.4132
Downloader.Trojan Symantec Trojan.DownLoader.3184
Downloader.Trojan Symantec Trojan.DownLoader.2884
Downloader.Trojan Symantec Trojan.DownLoader.1946
Downloader.Trojan Symantec Trojan.DownLoader.2039
Downloader.Trojan Symantec Trojan.DownLoader.3160
Downloader.Trojan Symantec Trojan.DownLoader.2172
Downloader.Trojan Symantec Trojan.DownLoader.2482
Downloader.Trojan Symantec Trojan.Psyphen.10
Downloader.Trojan Symantec Trojan.DownLoader.1958
Downloader.Trojan Symantec Trojan.DownLoader.2510
Downloader.Trojan Symantec Trojan.DownLoader.4851
Downloader.Trojan Symantec Trojan.DownLoader.4693
Downloader.Trojan Symantec Trojan.Egor

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.