FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.MulDrop.2952
Download.Trojan Symantec Trojan.MulDrop.3035
Download.Trojan Symantec Trojan.DownLoader.6119
Download.Trojan Symantec Trojan.DownLoader.4756
Download.Trojan Symantec Trojan.MulDrop.2689
Download.Trojan Symantec Trojan.MulDrop.2187
Download.Trojan Symantec Trojan.DownLoader.5360
Download.Trojan Symantec Trojan.DownLoader.457
Download.Trojan Symantec Trojan.MulDrop.2743
Download.Trojan Symantec Trojan.DownLoader.3759
Download.Trojan Symantec Trojan.LowZones.130
Download.Trojan Symantec Trojan.MulDrop.2651
Download.Trojan Symantec Trojan.MulDrop.2605
Download.Trojan Symantec Trojan.MulDrop.2938
Download.Trojan Symantec Trojan.Click.345
Download.Trojan Symantec Trojan.Wintrim
Download.Trojan Symantec Trojan.DownLoader.889
Download.Trojan Symantec Trojan.DownLoader
Download.Trojan Symantec Trojan.DownLoader.4552
Download.Trojan Symantec Trojan.Lemmy
Download.Trojan Symantec Trojan.Elzio
Download.Trojan Symantec Trojan.DownLoader.37376
Download.Trojan Symantec Trojan.DownLoader.767
Download.Trojan Symantec Trojan.DownLoader.6523
Download.Trojan Symantec Trojan.DownLoader.6547
Download.Trojan Symantec Trojan.Konsl.1
Download.Trojan Symantec Trojan.DownLoader.21232
Download.Trojan Symantec Trojan.DownLoader.6182
Download.Trojan Symantec Trojan.DownLoader.2598
Download.Trojan Symantec Trojan.DownLoader.300
Download.Trojan Symantec Trojan.DownLoader.302
Download.Trojan Symantec Trojan.DownLoader.343
Download.Trojan Symantec Trojan.DownLoader.367
Download.Trojan Symantec Trojan.DownLoader.2398
Download.Trojan Symantec Trojan.DownLoader.507
Download.Trojan Symantec Trojan.DownLoader.313
Download.Trojan Symantec Trojan.DownLoader.5280
Download.Trojan Symantec Trojan.DownLoader.6219
Download.Trojan Symantec Trojan.DownLoader.5895
Download.Trojan Symantec Trojan.DownLoader.4892
Download.Trojan Symantec Trojan.DownLoader.5891
Download.Trojan Symantec Trojan.DownLoader.5522
Download.Trojan Symantec Trojan.DownLoader.5355
Download.Trojan Symantec Trojan.DownLoader.4808
Download.Trojan Symantec Trojan.DownLoader.4794
Download.Trojan Symantec Trojan.DownLoader.5281
Download.Trojan Symantec Trojan.DownLoader.6108
Download.Trojan Symantec Trojan.DownLoader.5465
Download.Trojan Symantec Trojan.DownLoader.4575
Download.Trojan Symantec Trojan.DownLoader.5097

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies