FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.Phrostic.101
Download.Trojan Symantec Trojan.Illmob.20
Download.Trojan Symantec Trojan.DownLoader.1462
Download.Trojan Symantec BackDoor.Apcore
Download.Trojan Symantec Trojan.DownLoader.1973
Download.Trojan Symantec Trojan.DownLoader.1670
Download.Trojan Symantec Trojan.DownLoader.1908
Download.Trojan Symantec Trojan.DownLoader.2640
Download.Trojan Symantec Trojan.DownLoader.133
Download.Trojan Symantec Trojan.DownLoader.901
Download.Trojan Symantec Trojan.DownLoader.985
Download.Trojan Symantec Trojan.DownLoader.2150
Download.Trojan Symantec Trojan.DownLoader.1174
Download.Trojan Symantec Trojan.DownLoader.1387
Download.Trojan Symantec Trojan.DownLoader.1307
Download.Trojan Symantec Trojan.Tiger
Download.Trojan Symantec Trojan.DownLoader.907
Download.Trojan Symantec Trojan.DownLoader.1198
Download.Trojan Symantec Trojan.DownLoader.911
Download.Trojan Symantec Trojan.DownLoader.994
Download.Trojan Symantec Trojan.DownLoader.879
Download.Trojan Symantec Trojan.DownLoader.716
Download.Trojan Symantec Trojan.DownLoader.2286
Download.Trojan Symantec Trojan.DownLoader.723
Download.Trojan Symantec Trojan.DownLoader.722
Download.Trojan Symantec Trojan.DownLoader.1676
Download.Trojan Symantec Trojan.DownLoader.180
Download.Trojan Symantec Trojan.Click.237
Download.Trojan Symantec Trojan.DownLoader.1703
Download.Trojan Symantec Trojan.DownLoader.355
Download.Trojan Symantec BackDoor.Afcore.27
Download.Trojan Symantec Trojan.Hangout
Download.Trojan Symantec Trojan.Zasil
Download.Trojan Symantec Trojan.Axec
Download.Trojan Symantec Trojan.Qfav
Download.Trojan Symantec Trojan.DownLoader.791
Download.Trojan Symantec Trojan.StartPage.559
Download.Trojan Symantec Trojan.Click.252
Download.Trojan Symantec Trojan.DownLoader.1797
Download.Trojan Symantec Trojan.DownLoader.1994
Download.Trojan Symantec Trojan.DownLoader.1416
Download.Trojan Symantec Trojan.PWS.Banker.763
Download.Trojan Symantec Trojan.DownLoader.101
Download.Trojan Symantec Trojan.DownLoader.932
Download.Trojan Symantec Trojan.DownLoader.957
Download.Trojan Symantec Trojan.DownLoader.1915
Download.Trojan Symantec Trojan.ProxySniff
Download.Trojan Symantec Trojan.DownLoader.2135
Download.Trojan Symantec Trojan.DownLoader.2202
Download.Trojan Symantec Trojan.DownLoader.2272

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies