Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec BackDoor.ProRat.18
Downloader.Trojan Symantec Trojan.ZGet.5120
Downloader.Trojan Symantec Trojan.DownLoader.1801
Downloader.Trojan Symantec Trojan.DownLoader.2095
Downloader.Trojan Symantec Trojan.Nepro
Downloader.Trojan Symantec BackDoor.Generic.628
Downloader.Trojan Symantec Trojan.Click.310
Downloader.Trojan Symantec Trojan.DownLoader.3755
Downloader.Trojan Symantec Trojan.Steldon
Downloader.Trojan Symantec Trojan.DownLoader.2430
Downloader.Trojan Symantec Trojan.DownLoader.3486
Downloader.Trojan Symantec Trojan.DownLoader.2701
Downloader.Trojan Symantec Trojan.DownLoader.2770
Downloader.Trojan Symantec Trojan.DownLoader.20480
Downloader.Trojan Symantec Trojan.DownLoader.78
Downloader.Trojan Symantec Trojan.Click.309
Downloader.Trojan Symantec BackDoor.Generic.412
Downloader.Trojan Symantec Trojan.DownLoader.3177
Downloader.Trojan Symantec Trojan.DownLoader.2763
Downloader.Trojan Symantec Trojan.DownLoader.3143
Downloader.Trojan Symantec Trojan.PWS.Banker.656
Downloader.Trojan Symantec Trojan.DownLoader.5632
Downloader.Trojan Symantec Trojan.Secotho
Downloader.Trojan Symantec Trojan.DownLoader.102
Downloader.Trojan Symantec Trojan.Neetec
Downloader.Trojan Symantec Trojan.Isbar
Downloader.Trojan Symantec Trojan.Tofger.22017
Downloader.Trojan Symantec Trojan.ZGet.7640
Downloader.Trojan Symantec Trojan.Simcss
Downloader.Trojan Symantec Trojan.WinShow
Downloader.Trojan Symantec Trojan.DownLoader.3827
Downloader.Trojan Symantec BackDoor.Generic.567
Downloader.Trojan Symantec Trojan.DownLoader.3288
Downloader.Trojan Symantec Trojan.DownLoader.997
Downloader.Trojan Symantec Trojan.DownLoader.1685
Downloader.Trojan Symantec Trojan.DownLoader.28672
Downloader.Trojan Symantec Trojan.DownLoader.280
Downloader.Trojan Symantec BackDoor.IRC.Sdbot.244
Downloader.Trojan Symantec Trojan.Proxy.369
Downloader.Trojan Symantec Trojan.DownLoader.38912
Downloader.Trojan Symantec Trojan.DownLoader.621
Downloader.Trojan Symantec Trojan.DownLoader.3985
Downloader.Trojan Symantec Trojan.DownLoader.3452
Downloader.Trojan Symantec Trojan.DownLoader.2326
Downloader.Trojan Symantec Trojan.DownLoader.2392
Downloader.Trojan Symantec Trojan.FatalDown
Downloader.Trojan Symantec Trojan.DownLoader.1586
Downloader.Trojan Symantec Trojan.DownLoader.1108
Downloader.Trojan Symantec Trojan.DownLoader.3001
Downloader.Trojan Symantec Trojan.DownLoader.1232

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.