FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec BackDoor.Generic.953
Download.Trojan Symantec Trojan.DownLoader.3329
Download.Trojan Symantec Trojan.DownLoader.3358
Download.Trojan Symantec Trojan.DownLoader.214
Download.Trojan Symantec Trojan.DownLoader.4353
Download.Trojan Symantec Trojan.Kaizer
Download.Trojan Symantec Trojan.DownLoader.1151
Download.Trojan Symantec Trojan.DownLoader.1105
Download.Trojan Symantec Trojan.DownLoader.1009
Download.Trojan Symantec Trojan.DownLoader.965
Download.Trojan Symantec Trojan.Troll
Download.Trojan Symantec Trojan.DownLoader.2566
Download.Trojan Symantec Trojan.DownLoader.2567
Download.Trojan Symantec Trojan.DownLoader.2563
Download.Trojan Symantec Trojan.Injecter
Download.Trojan Symantec Trojan.DownLoader.2182
Download.Trojan Symantec Trojan.DownLoader.2429
Download.Trojan Symantec Trojan.DownLoader.1921
Download.Trojan Symantec Trojan.DownLoader.423
Download.Trojan Symantec Trojan.DownLoader.950
Download.Trojan Symantec Trojan.Helldo
Download.Trojan Symantec Trojan.DownLoader.94
Download.Trojan Symantec Trojan.DownLoader.10240
Download.Trojan Symantec Trojan.DownLoader.43008
Download.Trojan Symantec Trojan.GreetCard.4217
Download.Trojan Symantec Trojan.DownLoader.650
Download.Trojan Symantec Trojan.Galax
Download.Trojan Symantec Trojan.DownLoader.876
Download.Trojan Symantec Trojan.DownLoader.4750
Download.Trojan Symantec Trojan.Esepor
Download.Trojan Symantec Trojan.DownLoader.3093
Download.Trojan Symantec Trojan.Dluca.56832
Download.Trojan Symantec Trojan.DownLoader.3585
Download.Trojan Symantec Trojan.Armani
Download.Trojan Symantec Trojan.DownLoader.730
Download.Trojan Symantec Trojan.DownLoader.4114
Download.Trojan Symantec Trojan.DownLoader.4277
Download.Trojan Symantec Trojan.DownLoader.4115
Download.Trojan Symantec Trojan.DownLoader.4129
Download.Trojan Symantec Trojan.DownLoader.4368
Download.Trojan Symantec Trojan.DownLoader.3805
Download.Trojan Symantec Trojan.DownLoader.4295
Download.Trojan Symantec Trojan.DownLoader.4747
Download.Trojan Symantec Trojan.DownLoader.4174
Download.Trojan Symantec Trojan.PWS.Banker.884
Download.Trojan Symantec Trojan.DownLoader.4910
Download.Trojan Symantec Trojan.DownLoader.4311
Download.Trojan Symantec Trojan.DownLoader.4054
Download.Trojan Symantec Trojan.DownLoader.4184
Download.Trojan Symantec Trojan.DownLoader.4875

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies