FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.Feat.2
Download.Trojan Symantec Trojan.DownLoader.3247
Download.Trojan Symantec BackDoor.Alozo
Download.Trojan Symantec Trojan.DownLoader.3304
Download.Trojan Symantec Trojan.DownLoader.2696
Download.Trojan Symantec Trojan.DownLoader.2957
Download.Trojan Symantec Trojan.DownLoader.3374
Download.Trojan Symantec Trojan.DownLoader.2788
Download.Trojan Symantec Trojan.DownLoader.3002
Download.Trojan Symantec Trojan.DownLoader.3236
Download.Trojan Symantec Trojan.DownLoader.3005
Download.Trojan Symantec Trojan.DownLoader.3211
Download.Trojan Symantec Trojan.DownLoader.3194
Download.Trojan Symantec Trojan.DownLoader.3195
Download.Trojan Symantec Trojan.DownLoader.3152
Download.Trojan Symantec Trojan.DownLoader.2769
Download.Trojan Symantec Trojan.DownLoader.3702
Download.Trojan Symantec Dialer.Proclaim
Download.Trojan Symantec Trojan.Click.218
Download.Trojan Symantec Trojan.MulDrop.2080
Download.Trojan Symantec Trojan.DownLoader.3009
Download.Trojan Symantec Trojan.DownLoader.2619
Download.Trojan Symantec Trojan.DownLoader.2655
Download.Trojan Symantec Trojan.DownLoader.2659
Download.Trojan Symantec Trojan.DownLoader.3225
Download.Trojan Symantec Trojan.DownLoader.2337
Download.Trojan Symantec Trojan.DownLoader.610
Download.Trojan Symantec Trojan.DownLoader.3063
Download.Trojan Symantec Trojan.DownLoader.2633
Download.Trojan Symantec Trojan.DownLoader.2313
Download.Trojan Symantec Trojan.MulDrop.1975
Download.Trojan Symantec Trojan.DownLoader.3187
Download.Trojan Symantec Trojan.DownLoader.2457
Download.Trojan Symantec Trojan.DownLoader.2380
Download.Trojan Symantec Win32.HLLW.Eyeveg.2
Download.Trojan Symantec Trojan.DownLoader.2080
Download.Trojan Symantec Trojan.DownLoader.1855
Download.Trojan Symantec Trojan.DownLoader.403
Download.Trojan Symantec Trojan.DownLoader.2673
Download.Trojan Symantec Trojan.MulDrop.1811
Download.Trojan Symantec Trojan.MulDrop.1812
Download.Trojan Symantec Trojan.StartPage.414
Download.Trojan Symantec Trojan.MulDrop.1826
Download.Trojan Symantec Trojan.MulDrop.2321
Download.Trojan Symantec Trojan.DownLoader.266
Download.Trojan Symantec Trojan.Click.286
Download.Trojan Symantec Trojan.DownLoader.2178
Download.Trojan Symantec Trojan.DownLoader.1380
Download.Trojan Symantec Trojan.DownLoader.2527
Download.Trojan Symantec Trojan.DownLoader.1944

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies