FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.6086
Download.Trojan Symantec Trojan.DownLoader.6081
Download.Trojan Symantec Trojan.DownLoader.458
Download.Trojan Symantec Trojan.DownLoader.5316
Download.Trojan Symantec Trojan.DownLoader.6137
Download.Trojan Symantec Trojan.DownLoader.4393
Download.Trojan Symantec Trojan.DownLoader.4374
Download.Trojan Symantec Trojan.DownLoader.4316
Download.Trojan Symantec Trojan.Proxy.404
Download.Trojan Symantec Trojan.Proxy.398
Download.Trojan Symantec Trojan.DownLoader.5645
Download.Trojan Symantec Trojan.DownLoader.5781
Download.Trojan Symantec Trojan.DownLoader.5918
Download.Trojan Symantec Trojan.DownLoader.5818
Download.Trojan Symantec Trojan.Proxy.143
Download.Trojan Symantec Trojan.DownLoader.5551
Download.Trojan Symantec Trojan.DownLoader.4993
Download.Trojan Symantec Trojan.DownLoader.5877
Download.Trojan Symantec Trojan.DownLoader.6131
Download.Trojan Symantec Trojan.DownLoader.5923
Download.Trojan Symantec BackDoor.Generic.841
Download.Trojan Symantec Trojan.DownLoader.5869
Download.Trojan Symantec Trojan.DownLoader.5378
Download.Trojan Symantec Trojan.DownLoader.5946
Download.Trojan Symantec Trojan.DownLoader.3897
Download.Trojan Symantec Trojan.DownLoader.1638
Download.Trojan Symantec Trojan.DownLoader.5389
Download.Trojan Symantec Trojan.DownLoader.5404
Download.Trojan Symantec Trojan.Click.792
Download.Trojan Symantec Trojan.DownLoader.1335
Download.Trojan Symantec Trojan.DownLoader.5096
Download.Trojan Symantec Trojan.DownLoader.5401
Download.Trojan Symantec Trojan.DownLoader.5472
Download.Trojan Symantec Trojan.DownLoader.5440
Download.Trojan Symantec Trojan.DownLoader.5275
Download.Trojan Symantec Trojan.DownLoader.5403
Download.Trojan Symantec Trojan.DownLoader.5989
Download.Trojan Symantec Trojan.DownLoader.5299
Download.Trojan Symantec Trojan.DownLoader.5397
Download.Trojan Symantec Trojan.DownLoader.577
Download.Trojan Symantec Trojan.DownLoader.5420
Download.Trojan Symantec Trojan.DownLoader.5336
Download.Trojan Symantec Trojan.DownLoader.596
Download.Trojan Symantec Trojan.DownLoader.5239
Download.Trojan Symantec Trojan.DownLoader.5060
Download.Trojan Symantec Trojan.DownLoader.4888
Download.Trojan Symantec Trojan.DownLoader.5276
Download.Trojan Symantec Trojan.DownLoader.5054
Download.Trojan Symantec Trojan.StartPage.1053
Download.Trojan Symantec Trojan.StartPage.1074

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies