Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Downloader.Trojan aliases:

Name Vendor Dr.Web classification name
Downloader.Trojan Symantec Trojan.DownLoader.4744
Downloader.Trojan Symantec Trojan.DownLoader.4813
Downloader.Trojan Symantec Trojan.DownLoader.4660
Downloader.Trojan Symantec Trojan.DownLoader.5816
Downloader.Trojan Symantec Trojan.DownLoader.3393
Downloader.Trojan Symantec Trojan.DownLoader.4443
Downloader.Trojan Symantec Trojan.DownLoader.4532
Downloader.Trojan Symantec Trojan.DownLoader.3968
Downloader.Trojan Symantec Trojan.DownLoader.3734
Downloader.Trojan Symantec Trojan.DownLoader.3363
Downloader.Trojan Symantec Trojan.DownLoader.5118
Downloader.Trojan Symantec Trojan.DownLoader.4355
Downloader.Trojan Symantec Trojan.DownLoader.4510
Downloader.Trojan Symantec BackDoor.Cmrss
Downloader.Trojan Symantec Trojan.DownLoader.3526
Downloader.Trojan Symantec Trojan.DownLoader.4053
Downloader.Trojan Symantec Trojan.DownLoader.5113
Downloader.Trojan Symantec Trojan.DownLoader.6406
Downloader.Trojan Symantec Trojan.DownLoader.3627
Downloader.Trojan Symantec Trojan.DownLoader.3821
Downloader.Trojan Symantec Trojan.DownLoader.4332
Downloader.Trojan Symantec Trojan.DownLoader.3144
Downloader.Trojan Symantec Trojan.DownLoader.3279
Downloader.Trojan Symantec Trojan.DownLoader.5882
Downloader.Trojan Symantec Trojan.BeagleProxy
Downloader.Trojan Symantec Trojan.DownLoader.3233
Downloader.Trojan Symantec Trojan.DownLoader.5203
Downloader.Trojan Symantec Trojan.DownLoader.4195
Downloader.Trojan Symantec Trojan.DownLoader.4171
Downloader.Trojan Symantec Trojan.DownLoader.5940
Downloader.Trojan Symantec Trojan.DownLoader.4492
Downloader.Trojan Symantec Trojan.DownLoader.3989
Downloader.Trojan Symantec Trojan.DownLoader.5351
Downloader.Trojan Symantec Trojan.DownLoader.3953
Downloader.Trojan Symantec Win32.HLLM.Bagz
Downloader.Trojan Symantec Trojan.Kaizer.10
Downloader.Trojan Symantec Trojan.DownLoader.3013
Downloader.Trojan Symantec Trojan.DownLoader.1952
Downloader.Trojan Symantec Trojan.LowZones.124
Downloader.Trojan Symantec Trojan.Inor
Downloader.Trojan Symantec Trojan.MulDrop.406
Downloader.Trojan Symantec Trojan.Phreal
Downloader.Trojan Symantec Trojan.DownLoader.1848
Downloader.Trojan Symantec VBS.Psyme.82
Downloader.Trojan Symantec Trojan.PWS.Legmir.188
Downloader.Trojan Symantec Exploit.IFrame
Downloader.Trojan Symantec VBS.Psyme.67
Downloader.Trojan Symantec Exploit.DialogArg
Downloader.Trojan Symantec Trojan.DownLoader.90
Downloader.Trojan Symantec Trojan.DownLoader.1617

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.