FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.6049
Download.Trojan Symantec Trojan.DownLoader.5733
Download.Trojan Symantec Trojan.DownLoader.4554
Download.Trojan Symantec Trojan.DownLoader.5898
Download.Trojan Symantec Trojan.DownLoader.5363
Download.Trojan Symantec Trojan.DownLoader.5910
Download.Trojan Symantec Trojan.DownLoader.5909
Download.Trojan Symantec Trojan.DownLoader.5913
Download.Trojan Symantec Trojan.PWS.Banker.1406
Download.Trojan Symantec Trojan.DownLoader.5736
Download.Trojan Symantec Trojan.DownLoader.5753
Download.Trojan Symantec Trojan.DownLoader.5338
Download.Trojan Symantec Trojan.DownLoader.5525
Download.Trojan Symantec Trojan.DownLoader.5961
Download.Trojan Symantec Trojan.DownLoader.5785
Download.Trojan Symantec Trojan.DownLoader.5893
Download.Trojan Symantec Trojan.DownLoader.4841
Download.Trojan Symantec Trojan.Proxy.560
Download.Trojan Symantec Trojan.DownLoader.5464
Download.Trojan Symantec Trojan.DownLoader.5546
Download.Trojan Symantec Trojan.DownLoader.5673
Download.Trojan Symantec Trojan.DownLoader.5421
Download.Trojan Symantec Trojan.DownLoader.5815
Download.Trojan Symantec Trojan.DownLoader.5689
Download.Trojan Symantec Trojan.DownLoader.941
Download.Trojan Symantec Trojan.DownLoader.5775
Download.Trojan Symantec Trojan.DownLoader.6071
Download.Trojan Symantec Trojan.DownLoader.5499
Download.Trojan Symantec Trojan.MulDrop.3054
Download.Trojan Symantec Trojan.DownLoader.5224
Download.Trojan Symantec Trojan.DownLoader.5914
Download.Trojan Symantec Trojan.DownLoader.3814
Download.Trojan Symantec Trojan.DownLoader.5916
Download.Trojan Symantec Trojan.DownLoader.5796
Download.Trojan Symantec Trojan.DownLoader.5842
Download.Trojan Symantec Trojan.MulDrop.3059
Download.Trojan Symantec Trojan.DownLoader.5306
Download.Trojan Symantec Trojan.DownLoader.5872
Download.Trojan Symantec Trojan.DownLoader.5876
Download.Trojan Symantec Trojan.DownLoader.5788
Download.Trojan Symantec Trojan.DownLoader.5799
Download.Trojan Symantec Trojan.DownLoader.5826
Download.Trojan Symantec Trojan.DownLoader.5072
Download.Trojan Symantec Trojan.DownLoader.5751
Download.Trojan Symantec Trojan.DownLoader.5589
Download.Trojan Symantec Trojan.DownLoader.237
Download.Trojan Symantec Trojan.DownLoader.5764
Download.Trojan Symantec Trojan.DownLoader.5696
Download.Trojan Symantec Trojan.DownLoader.5672
Download.Trojan Symantec BackDoor.Pigeon.110

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies