FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.2907
Download.Trojan Symantec Win32.HLLW.Yall.27136
Download.Trojan Symantec Trojan.DownLoader.414
Download.Trojan Symantec Trojan.DownLoader.5770
Download.Trojan Symantec Trojan.MulDrop.2322
Download.Trojan Symantec Trojan.Click.531
Download.Trojan Symantec Trojan.DownLoader.2620
Download.Trojan Symantec Trojan.MulDrop.2165
Download.Trojan Symantec Trojan.DownLoader.2683
Download.Trojan Symantec Trojan.MulDrop.2199
Download.Trojan Symantec Trojan.Ants
Download.Trojan Symantec Trojan.DownLoader.2504
Download.Trojan Symantec Trojan.DownLoader.3712
Download.Trojan Symantec Trojan.DownLoader.6553
Download.Trojan Symantec Trojan.DownLoader.1904
Download.Trojan Symantec Trojan.DownLoader.2447
Download.Trojan Symantec Trojan.DownLoader.5533
Download.Trojan Symantec Trojan.DownLoader.6087
Download.Trojan Symantec Trojan.DownLoader.6035
Download.Trojan Symantec Trojan.Proxy.127
Download.Trojan Symantec Trojan.DownLoader.5219
Download.Trojan Symantec Trojan.DownLoader.5560
Download.Trojan Symantec Trojan.DownLoader.5479
Download.Trojan Symantec Trojan.DownLoader.2591
Download.Trojan Symantec Trojan.DownLoader.3844
Download.Trojan Symantec Trojan.DownLoader.4362
Download.Trojan Symantec Trojan.DownLoader.4375
Download.Trojan Symantec Trojan.DownLoader.4361
Download.Trojan Symantec Trojan.DownLoader.2715
Download.Trojan Symantec Trojan.DownLoader.3455
Download.Trojan Symantec Trojan.DownLoader.3449
Download.Trojan Symantec Trojan.MulDrop.2490
Download.Trojan Symantec Trojan.DownLoader.2775
Download.Trojan Symantec Trojan.DownLoader.3110
Download.Trojan Symantec Trojan.DownLoader.3112
Download.Trojan Symantec Trojan.DownLoader.3410
Download.Trojan Symantec Trojan.DownLoader.3140
Download.Trojan Symantec Trojan.DownLoader.3401
Download.Trojan Symantec Trojan.AVKill.6848
Download.Trojan Symantec Trojan.Sectho
Download.Trojan Symantec Trojan.LowZones.110
Download.Trojan Symantec Trojan.LowZones.114
Download.Trojan Symantec Trojan.Sandesa.11
Download.Trojan Symantec Trojan.DownLoader.747
Download.Trojan Symantec Trojan.DownLoader.1167
Download.Trojan Symantec Trojan.MulDrop.2054
Download.Trojan Symantec Trojan.DownLoader.5571
Download.Trojan Symantec Trojan.DownLoader.324
Download.Trojan Symantec Trojan.DownLoader.467
Download.Trojan Symantec BackDoor.ProRat.12

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies