Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Spy-Agent.dd aliases:

Name Vendor Dr.Web classification name
Spy-Agent.dd McAfee BackDoor.Darkshell
Spy-Agent.dd McAfee BackDoor.Pigeon.23758
Spy-Agent.dd McAfee Trojan.Inject.572
Spy-Agent.dd McAfee BackDoor.Pigeon.22132
Spy-Agent.dd McAfee Trojan.MulDrop.13277
Spy-Agent.dd McAfee BackDoor.Pigeon.21667
Spy-Agent.dd McAfee BackDoor.Pigeon.2208
Spy-Agent.dd McAfee BackDoor.Pigeon.5102
Spy-Agent.dd McAfee Trojan.PWS.Siggen.2
Spy-Agent.dd McAfee BackDoor.IRC.Evil.9
Spy-Agent.dd McAfee BackDoor.Pigeon.11815
Spy-Agent.dd McAfee Trojan.MulDrop.23267
Spy-Agent.dd McAfee BackDoor.Beizhu.719
Spy-Agent.dd McAfee BackDoor.Beizhu.1366
Spy-Agent.dd McAfee BackDoor.Pigeon.6066
Spy-Agent.dd McAfee Trojan.PWS.Panda.5
Spy-Agent.dd McAfee BackDoor.Pigeon.8018
Spy-Agent.dd McAfee BackDoor.Pigeon.8610
Spy-Agent.dd McAfee BackDoor.IRC.Evil
Spy-Agent.dd McAfee BackDoor.Huai.5814
Spy-Agent.dd McAfee Trojan.DownLoad1.43247
Spy-Agent.dd McAfee Trojan.PWS.Goldun
Spy-Agent.dd McAfee Trojan.Packed.472
Spy-Agent.dd McAfee DDoS.Kardraw
Spy-Agent.dd McAfee Trojan.MulDrop.18227
Spy-Agent.dd McAfee BackDoor.Beizhu.2377
Spy-Agent.dd McAfee BackDoor.Pigeon.17378
Spy-Agent.dd McAfee BackDoor.Pigeon.22357
Spy-Agent.dd McAfee BackDoor.Pigeon.6173
Spy-Agent.dd McAfee BackDoor.Beizhu.origin
Spy-Agent.dd McAfee BackDoor.Beizhu.2360
Spy-Agent.dd McAfee BackDoor.Beizhu.2487
Spy-Agent.dd McAfee Trojan.Packed.454
Spy-Agent.dd McAfee DDoS.Rincux
Spy-Agent.dd McAfee BackDoor.Pigeon.13203
Spy-Agent.dd McAfee Trojan.MulDrop.8367
Spy-Agent.dd McAfee BackDoor.Pigeon.21733
Spy-Agent.dd McAfee Trojan.MulDrop.35395
Spy-Agent.dd McAfee Trojan.MulDrop.17830
Spy-Agent.dd McAfee BackDoor.Pigeon.17263
Spy-Agent.dd McAfee Trojan.Packed.496
Spy-Agent.dd McAfee Trojan.Packed.143
Spy-Agent.dd McAfee BackDoor.Pigeon.22160
Spy-Agent.dd McAfee BackDoor.Pigeon.11882
Spy-Agent.dd McAfee BackDoor.Graybird
Spy-Agent.dd McAfee Tool.Transmit.3
Spy-Agent.dd McAfee BackDoor.Pigeon.20913
Spy-Agent.dd McAfee Trojan.PWS.MSNSpy
Spy-Agent.dd McAfee Trojan.MulDrop.31437
Spy-Agent.dd McAfee BackDoor.Pigeon.362

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.