Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Trojan.PWS.Agu
Downloader.Trojan Symantec Trojan.Proxy.261
Downloader.Trojan Symantec Trojan.MulDrop.2511
Downloader.Trojan Symantec Trojan.PWS.Jamie
Downloader.Trojan Symantec Trojan.DownLoader.824
Downloader.Trojan Symantec Trojan.DownLoader.5350
Downloader.Trojan Symantec Trojan.DownLoader.4464
Downloader.Trojan Symantec Trojan.DownLoader.3905
Downloader.Trojan Symantec Trojan.DownLoader.5183
Downloader.Trojan Symantec Trojan.MulDrop.1456
Downloader.Trojan Symantec Trojan.DownLoader.4927
Downloader.Trojan Symantec Win32.HLLM.Generic.349
Downloader.Trojan Symantec Trojan.DownLoader.2568
Downloader.Trojan Symantec Trojan.DownLoader.2985
Downloader.Trojan Symantec Trojan.DownLoader.2799
Downloader.Trojan Symantec Trojan.DownLoader.4049
Downloader.Trojan Symantec Trojan.DownLoader.2742
Downloader.Trojan Symantec Trojan.DownLoader.2023
Downloader.Trojan Symantec Trojan.DownLoader.2124
Downloader.Trojan Symantec Trojan.DownLoader.1305
Downloader.Trojan Symantec Trojan.DownLoader.1165
Downloader.Trojan Symantec Trojan.DownLoader.6197
Downloader.Trojan Symantec Trojan.DownLoader.17736
Downloader.Trojan Symantec Trojan.Relax
Downloader.Trojan Symantec BackDoor.IRC.Idea
Downloader.Trojan Symantec Trojan.DownLoader.644
Downloader.Trojan Symantec BackDoor.Generic.1223
Downloader.Trojan Symantec Trojan.DownLoader.6144
Downloader.Trojan Symantec Trojan.MulDrop.2796
Downloader.Trojan Symantec Trojan.DownLoader.6150
Downloader.Trojan Symantec Trojan.DownLoader.5746
Downloader.Trojan Symantec Trojan.DownLoader.5454
Downloader.Trojan Symantec Trojan.DownLoader.5850
Downloader.Trojan Symantec Trojan.MulDrop.3100
Downloader.Trojan Symantec Trojan.DownLoader.237
Downloader.Trojan Symantec Trojan.DownLoader.6278
Downloader.Trojan Symantec Trojan.MulDrop.3116
Downloader.Trojan Symantec Trojan.DownLoader.5400
Downloader.Trojan Symantec BackDoor.Generic.1201
Downloader.Trojan Symantec Trojan.DownLoader.5849
Downloader.Trojan Symantec Trojan.Proxy.581
Downloader.Trojan Symantec Trojan.PWS.Banker.based
Downloader.Trojan Symantec Trojan.DownLoader.5296
Downloader.Trojan Symantec Trojan.DownLoader.3938
Downloader.Trojan Symantec Trojan.DownLoader.5531
Downloader.Trojan Symantec Trojan.DownLoader.4310
Downloader.Trojan Symantec Trojan.DownLoader.5931
Downloader.Trojan Symantec Trojan.DownLoader.5578
Downloader.Trojan Symantec Trojan.DownLoader.5440
Downloader.Trojan Symantec Trojan.DownLoader.5703

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.