FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.2779
Download.Trojan Symantec Trojan.Darpa
Download.Trojan Symantec Trojan.DownLoader.3382
Download.Trojan Symantec Trojan.DownLoader.4036
Download.Trojan Symantec Trojan.DownLoader.3418
Download.Trojan Symantec Trojan.DownLoader.3707
Download.Trojan Symantec Trojan.DownLoader.6047
Download.Trojan Symantec Trojan.DownLoader.3031
Download.Trojan Symantec Trojan.DownLoader.3267
Download.Trojan Symantec Trojan.DownLoader.3147
Download.Trojan Symantec Trojan.DownLoader.3709
Download.Trojan Symantec Trojan.DownLoader.3215
Download.Trojan Symantec Trojan.PWS.Banker.1289
Download.Trojan Symantec Trojan.DownLoader.5517
Download.Trojan Symantec Trojan.DownLoader.3855
Download.Trojan Symantec Trojan.DownLoader.5474
Download.Trojan Symantec Trojan.DownLoader.4568
Download.Trojan Symantec Trojan.DownLoader.5538
Download.Trojan Symantec Trojan.DownLoader.5324
Download.Trojan Symantec Trojan.DownLoader.4354
Download.Trojan Symantec Trojan.DownLoader.5536
Download.Trojan Symantec Trojan.DownLoader.4803
Download.Trojan Symantec Trojan.DownLoader.4053
Download.Trojan Symantec Trojan.DownLoader.5023
Download.Trojan Symantec Trojan.DownLoader.5514
Download.Trojan Symantec Trojan.DownLoader.5092
Download.Trojan Symantec Trojan.DownLoader.5311
Download.Trojan Symantec Trojan.DownLoader.5286
Download.Trojan Symantec Trojan.DownLoader.5365
Download.Trojan Symantec Trojan.DownLoader.5370
Download.Trojan Symantec Trojan.DownLoader.4463
Download.Trojan Symantec Trojan.DownLoader.4305
Download.Trojan Symantec Trojan.DownLoader.4347
Download.Trojan Symantec Trojan.DownLoader.5066
Download.Trojan Symantec Trojan.DownLoader.4664
Download.Trojan Symantec Trojan.PWS.Banker.1080
Download.Trojan Symantec Trojan.DownLoader.3999
Download.Trojan Symantec Trojan.DownLoader.3797
Download.Trojan Symantec Trojan.DownLoader.4437
Download.Trojan Symantec Trojan.DownLoader.3310
Download.Trojan Symantec Trojan.DownLoader.3837
Download.Trojan Symantec Trojan.DownLoader.4804
Download.Trojan Symantec Trojan.DownLoader.4538
Download.Trojan Symantec Trojan.DownLoader.3801
Download.Trojan Symantec Trojan.DownLoader.3838
Download.Trojan Symantec Win32.Parite.2
Download.Trojan Symantec Trojan.DownLoader.3212
Download.Trojan Symantec Trojan.DownLoader.3834
Download.Trojan Symantec Trojan.DownLoader.4435
Download.Trojan Symantec Trojan.DownLoader.4012

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies