FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.4027
Download.Trojan Symantec Trojan.DownLoader.3471
Download.Trojan Symantec Trojan.DownLoader.3433
Download.Trojan Symantec Trojan.PWS.Banker.885
Download.Trojan Symantec Trojan.DownLoader.5146
Download.Trojan Symantec Trojan.DownLoader.5144
Download.Trojan Symantec Trojan.PWS.Banker.853
Download.Trojan Symantec Trojan.DownLoader.3350
Download.Trojan Symantec Trojan.DownLoader.3145
Download.Trojan Symantec Trojan.DownLoader.3430
Download.Trojan Symantec Trojan.DownLoader.3876
Download.Trojan Symantec BackDoor.Generic.1010
Download.Trojan Symantec Trojan.DownLoader.4567
Download.Trojan Symantec Trojan.DownLoader.3431
Download.Trojan Symantec Trojan.DownLoader.3955
Download.Trojan Symantec Trojan.DownLoader.5142
Download.Trojan Symantec Trojan.DownLoader.3338
Download.Trojan Symantec Trojan.DownLoader.5718
Download.Trojan Symantec Trojan.DownLoader.4894
Download.Trojan Symantec Trojan.DownLoader.3704
Download.Trojan Symantec Trojan.DownLoader.2909
Download.Trojan Symantec Trojan.DownLoader.3188
Download.Trojan Symantec Trojan.DownLoader.2889
Download.Trojan Symantec Trojan.DownLoader.5235
Download.Trojan Symantec Trojan.DownLoader.3525
Download.Trojan Symantec Trojan.DownLoader.4163
Download.Trojan Symantec Trojan.DownLoader.3415
Download.Trojan Symantec Trojan.DownLoader.2148
Download.Trojan Symantec Trojan.DownLoader.4792
Download.Trojan Symantec Trojan.DownLoader.4696
Download.Trojan Symantec Trojan.DownLoader.2452
Download.Trojan Symantec Trojan.DownLoader.5218
Download.Trojan Symantec Trojan.DownLoader.3369
Download.Trojan Symantec Trojan.DownLoader.4328
Download.Trojan Symantec Trojan.DownLoader.4162
Download.Trojan Symantec Trojan.DownLoader.3994
Download.Trojan Symantec Trojan.DownLoader.4335
Download.Trojan Symantec Trojan.DownLoader.817
Download.Trojan Symantec Trojan.DownLoader.4137
Download.Trojan Symantec Trojan.DownLoader.3728
Download.Trojan Symantec Trojan.DownLoader.5588
Download.Trojan Symantec Trojan.DownLoader.3317
Download.Trojan Symantec Trojan.DownLoader.3365
Download.Trojan Symantec Trojan.PWS.Banker.942
Download.Trojan Symantec Trojan.DownLoader.5520
Download.Trojan Symantec Trojan.DownLoader.3372
Download.Trojan Symantec Trojan.DownLoader.3473
Download.Trojan Symantec Trojan.DownLoader.3523
Download.Trojan Symantec Trojan.DownLoader.4569
Download.Trojan Symantec Trojan.Virtumod

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies