Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Trojan.DownLoader.5941
Downloader.Trojan Symantec Trojan.DownLoader.4281
Downloader.Trojan Symantec Trojan.DownLoader.3800
Downloader.Trojan Symantec Trojan.ZDown
Downloader.Trojan Symantec Trojan.DownLoader.5491
Downloader.Trojan Symantec Trojan.DownLoader.3287
Downloader.Trojan Symantec Trojan.PWS.Legmir.426
Downloader.Trojan Symantec BackDoor.Generic.1242
Downloader.Trojan Symantec Trojan.DownLoader.5301
Downloader.Trojan Symantec Trojan.DownLoader.5593
Downloader.Trojan Symantec Trojan.DownLoader.5417
Downloader.Trojan Symantec Trojan.DownLoader.5357
Downloader.Trojan Symantec Trojan.DownLoader.3217
Downloader.Trojan Symantec Trojan.DownLoader.5271
Downloader.Trojan Symantec Trojan.DownLoader.4762
Downloader.Trojan Symantec Trojan.DownLoader.5349
Downloader.Trojan Symantec Trojan.DownLoader.5220
Downloader.Trojan Symantec Trojan.DownLoader.6094
Downloader.Trojan Symantec Trojan.DownLoader.5211
Downloader.Trojan Symantec Trojan.DownLoader.5214
Downloader.Trojan Symantec Trojan.DownLoader.5210
Downloader.Trojan Symantec Trojan.DownLoader.5098
Downloader.Trojan Symantec Trojan.StartPage.1099
Downloader.Trojan Symantec Trojan.StartPage.1098
Downloader.Trojan Symantec Trojan.DownLoader.5081
Downloader.Trojan Symantec Trojan.DownLoader.4445
Downloader.Trojan Symantec Trojan.DownLoader.4440
Downloader.Trojan Symantec Trojan.DownLoader.5157
Downloader.Trojan Symantec Trojan.DownLoader.3692
Downloader.Trojan Symantec Trojan.DownLoader.2791
Downloader.Trojan Symantec Trojan.DownLoader.5068
Downloader.Trojan Symantec Trojan.DownLoader.2471
Downloader.Trojan Symantec BackDoor.Generic.1158
Downloader.Trojan Symantec BackDoor.Generic.1157
Downloader.Trojan Symantec Trojan.DownLoader.4789
Downloader.Trojan Symantec Trojan.Isbar.240
Downloader.Trojan Symantec Trojan.DownLoader.4609
Downloader.Trojan Symantec Trojan.DownLoader.4554
Downloader.Trojan Symantec Trojan.DownLoader.2899
Downloader.Trojan Symantec Trojan.DownLoader.4890
Downloader.Trojan Symantec Trojan.DownLoader.4965
Downloader.Trojan Symantec Trojan.DownLoader.3477
Downloader.Trojan Symantec Trojan.DownLoader.3122
Downloader.Trojan Symantec Trojan.DownLoader.4978
Downloader.Trojan Symantec Trojan.DownLoader.4986
Downloader.Trojan Symantec Trojan.DownLoader.5259
Downloader.Trojan Symantec Trojan.DownLoader.4499
Downloader.Trojan Symantec Trojan.DownLoader.4727
Downloader.Trojan Symantec Trojan.DownLoader.4832
Downloader.Trojan Symantec Trojan.DownLoader.4861

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.