Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Win32.HLLM.MyDoom.3
Downloader.Trojan Symantec Trojan.NroSocks
Downloader.Trojan Symantec Trojan.DownLoader.6015
Downloader.Trojan Symantec Trojan.Mafia.12
Downloader.Trojan Symantec Trojan.LowZones.77
Downloader.Trojan Symantec Trojan.DownLoader.740
Downloader.Trojan Symantec Trojan.LowZones.141
Downloader.Trojan Symantec BackDoor.Generic.958
Downloader.Trojan Symantec Win32.HLLW.Leox
Downloader.Trojan Symantec Trojan.DownLoader.344
Downloader.Trojan Symantec Trojan.Harnig
Downloader.Trojan Symantec Trojan.DownLoader.4715
Downloader.Trojan Symantec VBS.Psyme.66
Downloader.Trojan Symantec Trojan.DownLoader.6039
Downloader.Trojan Symantec Trojan.Dyfuca
Downloader.Trojan Symantec Adware.MDS
Downloader.Trojan Symantec Trojan.DownLoader.1456
Downloader.Trojan Symantec Trojan.Tooncom
Downloader.Trojan Symantec Trojan.DownLoader.3639
Downloader.Trojan Symantec Dialer.Premium
Downloader.Trojan Symantec Trojan.DownLoader.817
Downloader.Trojan Symantec Trojan.DownLoader.2433
Downloader.Trojan Symantec Trojan.DownLoader.5026
Downloader.Trojan Symantec Trojan.DownLoader.4431
Downloader.Trojan Symantec Trojan.DownLoader.4433
Downloader.Trojan Symantec Trojan.DownLoader.4000
Downloader.Trojan Symantec Trojan.DownLoader.3838
Downloader.Trojan Symantec Trojan.DownLoader.4015
Downloader.Trojan Symantec Trojan.DownLoader.4039
Downloader.Trojan Symantec Trojan.Click.638
Downloader.Trojan Symantec Trojan.DownLoader.3085
Downloader.Trojan Symantec Win32.HLLM.Cadastro
Downloader.Trojan Symantec Trojan.Darpa
Downloader.Trojan Symantec Trojan.PWS.Banker.781
Downloader.Trojan Symantec Trojan.PWS.Banker.785
Downloader.Trojan Symantec Trojan.DownLoader.3710
Downloader.Trojan Symantec Trojan.DownLoader.3301
Downloader.Trojan Symantec Trojan.DownLoader.3705
Downloader.Trojan Symantec Trojan.DownLoader.2712
Downloader.Trojan Symantec Trojan.DownLoader.2714
Downloader.Trojan Symantec Trojan.DownLoader.2716
Downloader.Trojan Symantec Trojan.DownLoader.3552
Downloader.Trojan Symantec Trojan.DownLoader.3227
Downloader.Trojan Symantec Trojan.DownLoader.3566
Downloader.Trojan Symantec Trojan.DownLoader.5291
Downloader.Trojan Symantec Trojan.DownLoader.2771
Downloader.Trojan Symantec Trojan.DownLoader.3960
Downloader.Trojan Symantec Trojan.DownLoader.3726
Downloader.Trojan Symantec Trojan.DownLoader.3855
Downloader.Trojan Symantec Trojan.DownLoader.4568

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.