Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Trojan.DownLoader.1699
Downloader.Trojan Symantec Trojan.DownLoader.1198
Downloader.Trojan Symantec Trojan.MulDrop.1170
Downloader.Trojan Symantec Trojan.Alfora
Downloader.Trojan Symantec BackDoor.Seeps
Downloader.Trojan Symantec Trojan.CgiLogger.10
Downloader.Trojan Symantec Trojan.PWS.Mifeng
Downloader.Trojan Symantec Trojan.Mytins
Downloader.Trojan Symantec Trojan.DownLoader.883
Downloader.Trojan Symantec Trojan.DownLoader.1784
Downloader.Trojan Symantec Trojan.DownLoader.2506
Downloader.Trojan Symantec Trojan.DownLoader.3308
Downloader.Trojan Symantec Trojan.DownLoader.2713
Downloader.Trojan Symantec Trojan.DownLoader.3134
Downloader.Trojan Symantec Trojan.DownLoader.1283
Downloader.Trojan Symantec Trojan.Slime
Downloader.Trojan Symantec Trojan.DownLoader.2105
Downloader.Trojan Symantec Trojan.DownLoader.2597
Downloader.Trojan Symantec Trojan.DownLoader.2962
Downloader.Trojan Symantec Trojan.DownLoader.2756
Downloader.Trojan Symantec BackDoor.Ovned
Downloader.Trojan Symantec Trojan.Thedl
Downloader.Trojan Symantec Trojan.DownLoader.43008
Downloader.Trojan Symantec Trojan.Iowa
Downloader.Trojan Symantec Trojan.DownLoader.2111
Downloader.Trojan Symantec Trojan.PWS.Banker.672
Downloader.Trojan Symantec Trojan.DownLoader.3554
Downloader.Trojan Symantec Trojan.DownLoader.2639
Downloader.Trojan Symantec Trojan.Iowa.10
Downloader.Trojan Symantec BackDoor.GSpot.20
Downloader.Trojan Symantec BackDoor.Estu
Downloader.Trojan Symantec Trojan.Swizzor
Downloader.Trojan Symantec Trojan.MulDrop.1426
Downloader.Trojan Symantec Trojan.DownLoader.3010
Downloader.Trojan Symantec Trojan.DownLoader.3146
Downloader.Trojan Symantec Trojan.DownLoader.3179
Downloader.Trojan Symantec Trojan.DownLoader.2802
Downloader.Trojan Symantec Trojan.DownLoader.4834
Downloader.Trojan Symantec Trojan.DownLoader.4506
Downloader.Trojan Symantec Trojan.DownLoader.1363
Downloader.Trojan Symantec Trojan.DownLoader.506
Downloader.Trojan Symantec Trojan.Earthsim
Downloader.Trojan Symantec Adware.ClearSearch
Downloader.Trojan Symantec Trojan.DownLoader.4031
Downloader.Trojan Symantec Win32.HLLW.Ronop.34816
Downloader.Trojan Symantec Trojan.PWS.RedZone.6501
Downloader.Trojan Symantec Trojan.MulDrop.2054
Downloader.Trojan Symantec Trojan.Ranky
Downloader.Trojan Symantec Trojan.DownLoader.2663
Downloader.Trojan Symantec Trojan.MulDrop.2664

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.