FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.976
Download.Trojan Symantec Trojan.StealthDown
Download.Trojan Symantec Trojan.DownLoader.881
Download.Trojan Symantec Exploit.DCom.26
Download.Trojan Symantec Trojan.DownLoader.898
Download.Trojan Symantec Trojan.Whomp.10
Download.Trojan Symantec Trojan.Click.514
Download.Trojan Symantec Trojan.StartPage.766
Download.Trojan Symantec Trojan.Click.529
Download.Trojan Symantec Trojan.DownLoader.3896
Download.Trojan Symantec Trojan.DownLoader.1854
Download.Trojan Symantec Trojan.DownLoader.50689
Download.Trojan Symantec Trojan.DownLoader.535
Download.Trojan Symantec Trojan.DownLoader.980
Download.Trojan Symantec Trojan.DownLoader.1120
Download.Trojan Symantec Trojan.DownLoader.1321
Download.Trojan Symantec Trojan.Tofger.12000
Download.Trojan Symantec Trojan.StartPage.883
Download.Trojan Symantec Trojan.KeyLogger.35
Download.Trojan Symantec Trojan.Proxy.300
Download.Trojan Symantec Trojan.DownLoader.1221
Download.Trojan Symantec Trojan.PWS.Banker.613
Download.Trojan Symantec Trojan.PWS.Leand
Download.Trojan Symantec Trojan.DownLoader.1453
Download.Trojan Symantec Trojan.DownLoader.452
Download.Trojan Symantec Trojan.DownLoader.715
Download.Trojan Symantec Trojan.DownLoader.6656
Download.Trojan Symantec Trojan.DownLoader.629
Download.Trojan Symantec Trojan.DownLoader.6176
Download.Trojan Symantec Trojan.DownLoader.88
Download.Trojan Symantec Trojan.DownLoader.84
Download.Trojan Symantec Trojan.PWS.LDPinch
Download.Trojan Symantec Trojan.DownLoader.2624
Download.Trojan Symantec Trojan.MulDrop.2166
Download.Trojan Symantec Trojan.Slime.26266
Download.Trojan Symantec Trojan.Click.63
Download.Trojan Symantec Trojan.Shutit.10
Download.Trojan Symantec Trojan.DownLoader.233
Download.Trojan Symantec Trojan.Mimail
Download.Trojan Symantec Trojan.RaShar
Download.Trojan Symantec Trojan.QBrowser
Download.Trojan Symantec Trojan.DownLoader.735
Download.Trojan Symantec Trojan.PWS.Jadie
Download.Trojan Symantec Trojan.PWS.Phong
Download.Trojan Symantec Trojan.DownLoader.1193
Download.Trojan Symantec Trojan.DownLoader.1785
Download.Trojan Symantec Trojan.Lopata
Download.Trojan Symantec Trojan.DownLoader.546
Download.Trojan Symantec BackDoor.Livup
Download.Trojan Symantec Trojan.DownLoader.1459

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies