FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.DownLoader.5495
Download.Trojan Symantec Trojan.DownLoader.5534
Download.Trojan Symantec Trojan.DownLoader.5515
Download.Trojan Symantec Trojan.DownLoader.5475
Download.Trojan Symantec Trojan.DownLoader.5463
Download.Trojan Symantec Trojan.DownLoader.5519
Download.Trojan Symantec Trojan.DownLoader.5453
Download.Trojan Symantec Trojan.DownLoader.5518
Download.Trojan Symantec Trojan.DownLoader.5524
Download.Trojan Symantec BackDoor.Generic.1201
Download.Trojan Symantec Trojan.DownLoader.5247
Download.Trojan Symantec Trojan.DownLoader.5459
Download.Trojan Symantec Trojan.DownLoader.5353
Download.Trojan Symantec Trojan.DownLoader.5340
Download.Trojan Symantec Trojan.DownLoader.5500
Download.Trojan Symantec Trojan.DownLoader.5930
Download.Trojan Symantec Trojan.DownLoader.5396
Download.Trojan Symantec Trojan.DownLoader.5529
Download.Trojan Symantec Trojan.Click.764
Download.Trojan Symantec Trojan.DownLoader.5347
Download.Trojan Symantec Trojan.DownLoader.5395
Download.Trojan Symantec Trojan.DownLoader.5418
Download.Trojan Symantec Trojan.DownLoader.5323
Download.Trojan Symantec Trojan.DownLoader.5331
Download.Trojan Symantec Trojan.DownLoader.5255
Download.Trojan Symantec Trojan.DownLoader.5377
Download.Trojan Symantec Trojan.DownLoader.5329
Download.Trojan Symantec Trojan.DownLoader.5226
Download.Trojan Symantec Trojan.DownLoader.5320
Download.Trojan Symantec Trojan.DownLoader.5269
Download.Trojan Symantec Trojan.DownLoader.5422
Download.Trojan Symantec Trojan.DownLoader.5162
Download.Trojan Symantec Trojan.DownLoader.5292
Download.Trojan Symantec Trojan.DownLoader.5387
Download.Trojan Symantec Trojan.DownLoader.5287
Download.Trojan Symantec Trojan.DownLoader.5265
Download.Trojan Symantec Trojan.DownLoader.5208
Download.Trojan Symantec Trojan.DownLoader.6322
Download.Trojan Symantec Trojan.DownLoader.5349
Download.Trojan Symantec Trojan.DownLoader.5249
Download.Trojan Symantec Trojan.DownLoader.3217
Download.Trojan Symantec Trojan.DownLoader.5290
Download.Trojan Symantec Trojan.DownLoader.5333
Download.Trojan Symantec Trojan.DownLoader.5573
Download.Trojan Symantec Trojan.DownLoader.5159
Download.Trojan Symantec Trojan.DownLoader.5264
Download.Trojan Symantec Trojan.DownLoader.5190
Download.Trojan Symantec Trojan.DownLoader.5168
Download.Trojan Symantec Trojan.DownLoader.4867
Download.Trojan Symantec Trojan.DownLoader.5158

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies