FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.1650
Download.Trojan Symantec Trojan.DownLoader.2603
Download.Trojan Symantec Trojan.DownLoader.4491
Download.Trojan Symantec Trojan.DownLoader.4561
Download.Trojan Symantec Trojan.DownLoader.4682
Download.Trojan Symantec Trojan.DownLoader.4258
Download.Trojan Symantec Trojan.PWS.Banker.753
Download.Trojan Symantec Trojan.DownLoader.4158
Download.Trojan Symantec Trojan.DownLoader.4329
Download.Trojan Symantec Trojan.DownLoader.4154
Download.Trojan Symantec Trojan.DownLoader.4199
Download.Trojan Symantec Trojan.DownLoader.4740
Download.Trojan Symantec Trojan.DownLoader.4407
Download.Trojan Symantec Trojan.DownLoader.4128
Download.Trojan Symantec Trojan.DownLoader.4482
Download.Trojan Symantec Trojan.DownLoader.4565
Download.Trojan Symantec Trojan.DownLoader.4675
Download.Trojan Symantec Trojan.DownLoader.4486
Download.Trojan Symantec Trojan.DownLoader.4579
Download.Trojan Symantec Trojan.DownLoader.4743
Download.Trojan Symantec Trojan.DownLoader.4308
Download.Trojan Symantec Trojan.PWS.Banker.954
Download.Trojan Symantec Trojan.DownLoader.4238
Download.Trojan Symantec Trojan.DownLoader.4244
Download.Trojan Symantec Trojan.DownLoader.4237
Download.Trojan Symantec Trojan.DownLoader.4479
Download.Trojan Symantec Trojan.DownLoader.4193
Download.Trojan Symantec Trojan.DownLoader.4577
Download.Trojan Symantec Trojan.DownLoader.4697
Download.Trojan Symantec Trojan.DownLoader.5428
Download.Trojan Symantec Trojan.DownLoader.5947
Download.Trojan Symantec Trojan.DownLoader.1008
Download.Trojan Symantec Trojan.DownLoader.4157
Download.Trojan Symantec Trojan.DownLoader.4257
Download.Trojan Symantec Trojan.DownLoader.3190
Download.Trojan Symantec Trojan.Atmaca.10
Download.Trojan Symantec Trojan.DownLoader.3386
Download.Trojan Symantec Trojan.DownLoader.4262
Download.Trojan Symantec Trojan.DownLoader.393
Download.Trojan Symantec Trojan.DownLoader.4673
Download.Trojan Symantec Trojan.Aphex.12
Download.Trojan Symantec Aphex.Generator.30
Download.Trojan Symantec Trojan.DownLoader.3901
Download.Trojan Symantec Trojan.DownLoader.3635
Download.Trojan Symantec Trojan.DownLoader.3481
Download.Trojan Symantec Trojan.MulDrop.2496
Download.Trojan Symantec Trojan.DownLoader.4595
Download.Trojan Symantec Trojan.DownLoader.2760
Download.Trojan Symantec Trojan.Click.750
Download.Trojan Symantec Trojan.DownLoader.5149

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies