Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_DOWNLOAD.A aliases:

Name Vendor Dr.Web classification name
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1286
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.984
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.572
TROJ_DOWNLOAD.A Trend Micro Trojan.Supdow
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1041
TROJ_DOWNLOAD.A Trend Micro Trojan.FWB
TROJ_DOWNLOAD.A Trend Micro BackDoor.Generic.841
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1335
TROJ_DOWNLOAD.A Trend Micro Trojan.StamLoader
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.580
TROJ_DOWNLOAD.A Trend Micro Trojan.Feat.2
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.266
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1326
TROJ_DOWNLOAD.A Trend Micro Trojan.Qhost
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.383
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.453
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1033
TROJ_DOWNLOAD.A Trend Micro Trojan.LowZones
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1584
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.999
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.3946
TROJ_DOWNLOAD.A Trend Micro BackDoor.Generic.914
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1124
TROJ_DOWNLOAD.A Trend Micro Trojan.PWS.Bancos.82
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.951
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1742
TROJ_DOWNLOAD.A Trend Micro BackDoor.Generic.674
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.151
TROJ_DOWNLOAD.A Trend Micro Trojan.Webmonit
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.732
TROJ_DOWNLOAD.A Trend Micro Trojan.Click.109
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.217
TROJ_DOWNLOAD.A Trend Micro BackDoor.Generic.905
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.835
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.880
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.17408
TROJ_DOWNLOAD.A Trend Micro Trojan.Lar.7200
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.986
TROJ_DOWNLOAD.A Trend Micro Trojan.MulDrop.1352
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.516
TROJ_DOWNLOAD.A Trend Micro Trojan.ScorpClick
TROJ_DOWNLOAD.A Trend Micro Trojan.PWS.Bancos.137
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.428
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.873
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.877
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.844
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.204
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.1013
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.478
TROJ_DOWNLOAD.A Trend Micro Trojan.DownLoader.566

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.