FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.3013
Download.Trojan Symantec Trojan.MulDrop.2010
Download.Trojan Symantec Trojan.DownLoader.2577
Download.Trojan Symantec Trojan.DownLoader.4112
Download.Trojan Symantec Trojan.DownLoader.1920
Download.Trojan Symantec Trojan.DownLoader.1927
Download.Trojan Symantec Trojan.DownLoader.2158
Download.Trojan Symantec Trojan.DownLoader.1646
Download.Trojan Symantec Trojan.DownLoader.1952
Download.Trojan Symantec Trojan.DownLoader.1244
Download.Trojan Symantec Trojan.DownLoader.1662
Download.Trojan Symantec Trojan.DownLoader.3286
Download.Trojan Symantec Trojan.DownLoader.1443
Download.Trojan Symantec Trojan.DownLoader.1523
Download.Trojan Symantec Trojan.DownLoader.3029
Download.Trojan Symantec Trojan.DownLoader.1556
Download.Trojan Symantec Trojan.DownLoader.1055
Download.Trojan Symantec Trojan.DownLoader.4594
Download.Trojan Symantec Trojan.DownLoader.5835
Download.Trojan Symantec Trojan.DownLoader.3920
Download.Trojan Symantec Trojan.DownLoader.2114
Download.Trojan Symantec Trojan.DownLoader.1080
Download.Trojan Symantec Trojan.DownLoader.865
Download.Trojan Symantec Trojan.DownLoader.1096
Download.Trojan Symantec Trojan.DownLoader.903
Download.Trojan Symantec Trojan.DownLoader.1987
Download.Trojan Symantec Trojan.DownLoader.759
Download.Trojan Symantec Trojan.DownLoader.795
Download.Trojan Symantec Trojan.DownLoader.1842
Download.Trojan Symantec Trojan.DownLoader.912
Download.Trojan Symantec Trojan.DownLoader.1039
Download.Trojan Symantec Trojan.DownLoader.1901
Download.Trojan Symantec Trojan.DownLoader.572
Download.Trojan Symantec Trojan.DownLoader.435
Download.Trojan Symantec Trojan.Persist
Download.Trojan Symantec Trojan.DownLoader.487
Download.Trojan Symantec Trojan.DownLoader.581
Download.Trojan Symantec Trojan.DownLoader.411
Download.Trojan Symantec Trojan.DownLoader.6458
Download.Trojan Symantec Trojan.DownLoader.725
Download.Trojan Symantec Trojan.DownLoader.3312
Download.Trojan Symantec Trojan.DownLoader.1575
Download.Trojan Symantec Trojan.Fout
Download.Trojan Symantec Trojan.DownLoader.591
Download.Trojan Symantec Adware.EliteBar
Download.Trojan Symantec Trojan.DownLoader.3079
Download.Trojan Symantec Trojan.Phezex
Download.Trojan Symantec Trojan.DownLoader.2668
Download.Trojan Symantec Trojan.DownLoader.1266
Download.Trojan Symantec Trojan.Dasmin

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies