FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.10752
Download.Trojan Symantec Trojan.DownLoader.125
Download.Trojan Symantec Trojan.DownLoader.400
Download.Trojan Symantec Trojan.DownLoader.624
Download.Trojan Symantec Trojan.DownLoader.103
Download.Trojan Symantec Trojan.DownLoader.2494
Download.Trojan Symantec Trojan.DownLoader.3964
Download.Trojan Symantec Trojan.StartPage.755
Download.Trojan Symantec Trojan.DownLoader.1909
Download.Trojan Symantec Trojan.DownLoader.2001
Download.Trojan Symantec Trojan.DownLoader.2027
Download.Trojan Symantec Trojan.DownLoader.1464
Download.Trojan Symantec Trojan.DownLoader.3054
Download.Trojan Symantec Trojan.DownLoader.3055
Download.Trojan Symantec Trojan.MulDrop.1507
Download.Trojan Symantec Trojan.DownLoader.1621
Download.Trojan Symantec Trojan.DownLoader.2211
Download.Trojan Symantec Trojan.DownLoader.1665
Download.Trojan Symantec Trojan.DownLoader.1479
Download.Trojan Symantec Trojan.DownLoader.3028
Download.Trojan Symantec Trojan.DownLoader.1084
Download.Trojan Symantec Trojan.DownLoader.2323
Download.Trojan Symantec Trojan.DownLoader.3559
Download.Trojan Symantec Trojan.DownLoader.2115
Download.Trojan Symantec Trojan.DownLoader.1832
Download.Trojan Symantec Trojan.DownLoader.1292
Download.Trojan Symantec Trojan.DownLoader.2128
Download.Trojan Symantec Trojan.MulDrop.1206
Download.Trojan Symantec Trojan.DownLoader.1160
Download.Trojan Symantec Trojan.DownLoader.1831
Download.Trojan Symantec Trojan.Energy
Download.Trojan Symantec Trojan.DownLoader.124
Download.Trojan Symantec Trojan.DownLoader.1590
Download.Trojan Symantec Trojan.DownLoader.681
Download.Trojan Symantec Trojan.DownLoader.781
Download.Trojan Symantec Trojan.DownLoader.800
Download.Trojan Symantec Trojan.DownLoader.395
Download.Trojan Symantec Trojan.DownLoader.714
Download.Trojan Symantec Trojan.DownLoader.1386
Download.Trojan Symantec Trojan.DownLoader.1574
Download.Trojan Symantec Trojan.DownLoader.514
Download.Trojan Symantec Trojan.DownLoader.491
Download.Trojan Symantec Trojan.Kiil
Download.Trojan Symantec Trojan.Ptop
Download.Trojan Symantec Trojan.DownLoader.2109
Download.Trojan Symantec Trojan.DownLoader.358
Download.Trojan Symantec Trojan.DownLoader.1511
Download.Trojan Symantec Trojan.DownLoader.2606
Download.Trojan Symantec Trojan.DownLoader.1201
Download.Trojan Symantec Trojan.Click.53

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies