FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Download.Trojan aliases:

Name Vendor Dr.Web classification name
Download.Trojan Symantec Trojan.Uploader.24576
Download.Trojan Symantec BackDoor.Generic.674
Download.Trojan Symantec Trojan.DownLoader.188
Download.Trojan Symantec Trojan.DownLoader.95
Download.Trojan Symantec Trojan.DownLoader.151
Download.Trojan Symantec Trojan.Webmonit
Download.Trojan Symantec Trojan.Salite.12
Download.Trojan Symantec Trojan.IED.10
Download.Trojan Symantec Trojan.IED.101
Download.Trojan Symantec Trojan.IED.11
Download.Trojan Symantec Trojan.DownLoader.2679
Download.Trojan Symantec Trojan.DownLoader.1060
Download.Trojan Symantec Trojan.Cyberush
Download.Trojan Symantec Trojan.Steldon
Download.Trojan Symantec Trojan.DownLoader.9472
Download.Trojan Symantec Trojan.PWS.QQDragon
Download.Trojan Symantec Trojan.Click.644
Download.Trojan Symantec Trojan.DownLoader.955
Download.Trojan Symantec Trojan.DownLoader.184
Download.Trojan Symantec Trojan.DownLoader.3354
Download.Trojan Symantec BackDoor.Cyrex.10
Download.Trojan Symantec BackDoor.Generic.308
Download.Trojan Symantec Trojan.DownLoader.2913
Download.Trojan Symantec Trojan.DownLoader.2915
Download.Trojan Symantec Trojan.Konsl.73
Download.Trojan Symantec Trojan.DownLoader.2757
Download.Trojan Symantec Trojan.DownLoader.228
Download.Trojan Symantec Trojan.DownLoader.732
Download.Trojan Symantec Trojan.Click.113
Download.Trojan Symantec Trojan.Click.109
Download.Trojan Symantec Trojan.DownLoader.607
Download.Trojan Symantec Trojan.DownLoader.1812
Download.Trojan Symantec Trojan.DownLoader.277
Download.Trojan Symantec Trojan.Click.40
Download.Trojan Symantec Trojan.Topas
Download.Trojan Symantec Trojan.DownLoader.1426
Download.Trojan Symantec Trojan.StartPage.171
Download.Trojan Symantec Trojan.DownLoader.2319
Download.Trojan Symantec Trojan.DownLoader.3270
Download.Trojan Symantec Trojan.StartPage.395
Download.Trojan Symantec Trojan.StartPage.353
Download.Trojan Symantec Trojan.DownLoader.2680
Download.Trojan Symantec BackDoor.Catal
Download.Trojan Symantec Trojan.DownLoader.3172
Download.Trojan Symantec Trojan.DownLoader.2090
Download.Trojan Symantec BackDoor.Generic.905
Download.Trojan Symantec Trojan.DownLoader.1998
Download.Trojan Symantec Trojan.DownLoader.174
Download.Trojan Symantec Trojan.DownLoader.835
Download.Trojan Symantec Trojan.Smalprox

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies