FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.3469
Download.Trojan Symantec Trojan.DownLoader.3988
Download.Trojan Symantec Trojan.DownLoader.1218
Download.Trojan Symantec Trojan.DownLoader.422
Download.Trojan Symantec Trojan.Offun
Download.Trojan Symantec Trojan.DownLoader.670
Download.Trojan Symantec Trojan.DownLoader.1999
Download.Trojan Symantec Trojan.DownLoader.1986
Download.Trojan Symantec Trojan.Click.187
Download.Trojan Symantec Trojan.DownLoader.1424
Download.Trojan Symantec Trojan.DownLoader.694
Download.Trojan Symantec Trojan.DownLoader.736
Download.Trojan Symantec Trojan.DownLoader.18944
Download.Trojan Symantec Trojan.Aphex.3
Download.Trojan Symantec Trojan.Aphex.50
Download.Trojan Symantec Trojan.Cmdget
Download.Trojan Symantec Trojan.DownLoader.1131
Download.Trojan Symantec Trojan.DownLoader.5237
Download.Trojan Symantec Trojan.MulDrop.2681
Download.Trojan Symantec Trojan.DownLoader.3522
Download.Trojan Symantec Trojan.Runmem
Download.Trojan Symantec Trojan.DownLoader.3484
Download.Trojan Symantec Trojan.MulDrop.2729
Download.Trojan Symantec Trojan.Adex
Download.Trojan Symantec Trojan.DownLoader.1724
Download.Trojan Symantec Trojan.DownLoader.2506
Download.Trojan Symantec Trojan.DownLoader.5313
Download.Trojan Symantec Trojan.DownLoader.5205
Download.Trojan Symantec Trojan.DownLoader.5211
Download.Trojan Symantec Trojan.DownLoader.3326
Download.Trojan Symantec Trojan.DownLoader.4572
Download.Trojan Symantec Trojan.DownLoader.2836
Download.Trojan Symantec Trojan.DownLoader.4401
Download.Trojan Symantec Trojan.MulDrop.2966
Download.Trojan Symantec Trojan.DownLoader.3983
Download.Trojan Symantec Trojan.DownLoader.4876
Download.Trojan Symantec Trojan.Proxy.572
Download.Trojan Symantec Trojan.DownLoader.4843
Download.Trojan Symantec Trojan.DownLoader.4828
Download.Trojan Symantec Trojan.DownLoader.5303
Download.Trojan Symantec Trojan.DownLoader.6266
Download.Trojan Symantec Trojan.DownLoader.4871
Download.Trojan Symantec Trojan.DownLoader.4927
Download.Trojan Symantec Trojan.MulDrop.2723
Download.Trojan Symantec Trojan.DownLoader.4544
Download.Trojan Symantec Trojan.MulDrop.2707
Download.Trojan Symantec Trojan.DownLoader.341
Download.Trojan Symantec Trojan.DownLoader.2193
Download.Trojan Symantec Trojan.DownLoader.1778
Download.Trojan Symantec Trojan.DownLoader.191

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies