FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.6317
Download.Trojan Symantec Trojan.DownLoader.5678
Download.Trojan Symantec Trojan.DownLoader.5317
Download.Trojan Symantec Trojan.DownLoader.6029
Download.Trojan Symantec Trojan.DownLoader.6342
Download.Trojan Symantec Trojan.DownLoader.4805
Download.Trojan Symantec Trojan.DownLoader.6390
Download.Trojan Symantec Trojan.DownLoader.6094
Download.Trojan Symantec Trojan.DownLoader.6139
Download.Trojan Symantec Trojan.DownLoader.5879
Download.Trojan Symantec Trojan.DownLoader.970
Download.Trojan Symantec Trojan.DownLoader.6262
Download.Trojan Symantec Trojan.DownLoader.6582
Download.Trojan Symantec Trojan.StartPage.1202
Download.Trojan Symantec Trojan.DownLoader.6180
Download.Trojan Symantec Trojan.Click.833
Download.Trojan Symantec Trojan.DownLoader.5434
Download.Trojan Symantec Trojan.DownLoader.6091
Download.Trojan Symantec BackDoor.Generic.1243
Download.Trojan Symantec Trojan.DownLoader.5801
Download.Trojan Symantec Trojan.DownLoader.5793
Download.Trojan Symantec Trojan.DownLoader.6090
Download.Trojan Symantec Trojan.DownLoader.5943
Download.Trojan Symantec Trojan.DownLoader.5863
Download.Trojan Symantec Trojan.DownLoader.6177
Download.Trojan Symantec Trojan.DownLoader.6124
Download.Trojan Symantec Trojan.DownLoader.6088
Download.Trojan Symantec Trojan.DownLoader.6188
Download.Trojan Symantec Trojan.StartPage.1198
Download.Trojan Symantec Trojan.DownLoader.6096
Download.Trojan Symantec Trojan.DownLoader.6310
Download.Trojan Symantec Trojan.DownLoader.6059
Download.Trojan Symantec Trojan.DownLoader.6072
Download.Trojan Symantec Trojan.DownLoader.5906
Download.Trojan Symantec Trojan.DownLoader.6126
Download.Trojan Symantec Trojan.DownLoader.6074
Download.Trojan Symantec Trojan.DownLoader.6019
Download.Trojan Symantec Trojan.DownLoader.6337
Download.Trojan Symantec Trojan.DownLoader.6303
Download.Trojan Symantec Trojan.DownLoader.6037
Download.Trojan Symantec BackDoor.Generic.1219
Download.Trojan Symantec Trojan.DownLoader.6022
Download.Trojan Symantec Trojan.DownLoader.5976
Download.Trojan Symantec Trojan.DownLoader.6571
Download.Trojan Symantec Trojan.DownLoader.6491
Download.Trojan Symantec Trojan.DownLoader.5967
Download.Trojan Symantec Trojan.DownLoader.5797
Download.Trojan Symantec Trojan.DownLoader.5988
Download.Trojan Symantec Trojan.DownLoader.5975
Download.Trojan Symantec Trojan.DownLoader.5955

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies