FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.3882
Download.Trojan Symantec Trojan.DownLoader.3735
Download.Trojan Symantec Trojan.DownLoader.4404
Download.Trojan Symantec Trojan.DownLoader.4367
Download.Trojan Symantec Trojan.DownLoader.4771
Download.Trojan Symantec Trojan.DownLoader.3414
Download.Trojan Symantec Trojan.DownLoader.4911
Download.Trojan Symantec Trojan.DownLoader.4123
Download.Trojan Symantec Trojan.DownLoader.3990
Download.Trojan Symantec Trojan.DownLoader.3798
Download.Trojan Symantec Trojan.PWS.Banker.1053
Download.Trojan Symantec Trojan.DownLoader.3318
Download.Trojan Symantec Trojan.DownLoader.3243
Download.Trojan Symantec Trojan.DownLoader.3970
Download.Trojan Symantec Trojan.DownLoader.3943
Download.Trojan Symantec Trojan.Gezidown
Download.Trojan Symantec Trojan.DownLoader.3208
Download.Trojan Symantec Trojan.DownLoader.2677
Download.Trojan Symantec Trojan.DownLoader.2785
Download.Trojan Symantec Trojan.DownLoader.2521
Download.Trojan Symantec Trojan.DownLoader.1870
Download.Trojan Symantec Trojan.StartPage.917
Download.Trojan Symantec Trojan.DownLoader.3741
Download.Trojan Symantec Trojan.DownLoader.5114
Download.Trojan Symantec Trojan.DownLoader.26112
Download.Trojan Symantec Trojan.DownLoader.2131
Download.Trojan Symantec Trojan.DownLoader.1776
Download.Trojan Symantec Trojan.DownLoader.5234
Download.Trojan Symantec Trojan.DownLoader.947
Download.Trojan Symantec Trojan.PWS.Banker.158
Download.Trojan Symantec Trojan.DownLoader.5124
Download.Trojan Symantec Trojan.DownLoader.3472
Download.Trojan Symantec Trojan.DownLoader.2580
Download.Trojan Symantec Trojan.DownLoader.1095
Download.Trojan Symantec Trojan.DownLoader.1223
Download.Trojan Symantec Trojan.DownLoader.1192
Download.Trojan Symantec Trojan.DownLoader.1222
Download.Trojan Symantec Trojan.DownLoader.1216
Download.Trojan Symantec Trojan.DownLoader.2790
Download.Trojan Symantec Trojan.DownLoader.1877
Download.Trojan Symantec Trojan.DownLoader.3993
Download.Trojan Symantec Trojan.DownLoader.729
Download.Trojan Symantec Trojan.DownLoader.946
Download.Trojan Symantec Trojan.DownLoader.1086
Download.Trojan Symantec Trojan.DownLoader.1019
Download.Trojan Symantec Trojan.DownLoader.547
Download.Trojan Symantec Trojan.DownLoader.972
Download.Trojan Symantec Trojan.DownLoader.702
Download.Trojan Symantec Trojan.DownLoader.676
Download.Trojan Symantec Trojan.DownLoader.1837

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies