Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.4047
Download.Trojan Symantec Trojan.DownLoader.3378
Download.Trojan Symantec Trojan.DownLoader.4315
Download.Trojan Symantec Trojan.DownLoader.5769
Download.Trojan Symantec Trojan.DownLoader.2020
Download.Trojan Symantec Trojan.DownLoader.4806
Download.Trojan Symantec BackDoor.WebDor
Download.Trojan Symantec Trojan.Cipher
Download.Trojan Symantec BackDoor.Action
Download.Trojan Symantec Trojan.Click.371
Download.Trojan Symantec Trojan.DownLoader.3763
Download.Trojan Symantec Trojan.DownLoader.4045
Download.Trojan Symantec Trojan.MulDrop.2432
Download.Trojan Symantec Trojan.DownLoader.3336
Download.Trojan Symantec Trojan.DownLoader.2882
Download.Trojan Symantec Win32.HLLM.Fox
Download.Trojan Symantec Trojan.DownLoader.3032
Download.Trojan Symantec Trojan.DownLoader.3349
Download.Trojan Symantec Trojan.DownLoader.5424
Download.Trojan Symantec Trojan.DownLoader.5426
Download.Trojan Symantec Trojan.DownLoader.3323
Download.Trojan Symantec Trojan.DownLoader.4432
Download.Trojan Symantec Trojan.DownLoader.4122
Download.Trojan Symantec Trojan.DownLoader.1125
Download.Trojan Symantec Trojan.DownLoader.1616
Download.Trojan Symantec Trojan.Horas
Download.Trojan Symantec Trojan.DownLoader.1653
Download.Trojan Symantec Trojan.DownLoader.1663
Download.Trojan Symantec Trojan.DownLoader.1245
Download.Trojan Symantec Dialer.Pin
Download.Trojan Symantec Trojan.DownLoader.1286
Download.Trojan Symantec Trojan.Click.181
Download.Trojan Symantec Trojan.DownLoader.4566
Download.Trojan Symantec Trojan.DownLoader.1750
Download.Trojan Symantec Trojan.DownLoader.1809
Download.Trojan Symantec Trojan.DownLoader.1471
Download.Trojan Symantec Trojan.DownLoader.1121
Download.Trojan Symantec Adware.Msearch
Download.Trojan Symantec Trojan.DownLoader.1276
Download.Trojan Symantec Trojan.DownLoader.1438
Download.Trojan Symantec Trojan.DownLoader.1205
Download.Trojan Symantec Trojan.DownLoader.1214
Download.Trojan Symantec Trojan.DownLoader.1993
Download.Trojan Symantec Trojan.DownLoader.1100
Download.Trojan Symantec Trojan.DownLoader.1455
Download.Trojan Symantec Adware.Websearch
Download.Trojan Symantec Trojan.DownLoader.1073
Download.Trojan Symantec Trojan.DownLoader.216
Download.Trojan Symantec Trojan.DownLoader.1014
Download.Trojan Symantec Trojan.PWS.Banker.138

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.