Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Agent.bcn aliases:

Name Vendor Dr.Web classification name
TR/Agent.bcn Avira Trojan.MulDrop.12389
TR/Agent.bcn Avira BackDoor.Bifrost.515
TR/Agent.bcn Avira BackDoor.Bifrost.827
TR/Agent.bcn Avira Trojan.MulDrop.17658
TR/Agent.bcn Avira BackDoor.Bifrost.66
TR/Agent.bcn Avira Trojan.MulDrop.7964
TR/Agent.bcn Avira Trojan.DownLoader.50961
TR/Agent.bcn Avira Trojan.MulDrop.10218
TR/Agent.bcn Avira Trojan.MulDrop.11541
TR/Agent.bcn Avira Trojan.DownLoader.65461
TR/Agent.bcn Avira Trojan.KeyLogger.1908
TR/Agent.bcn Avira BackDoor.Bifrost.655
TR/Agent.bcn Avira BackDoor.Bifrost.517
TR/Agent.bcn Avira BackDoor.Bifrost.57
TR/Agent.bcn Avira BackDoor.Bifrost.865
TR/Agent.bcn Avira BackDoor.Bifrost.830
TR/Agent.bcn Avira Trojan.MulDrop.14731
TR/Agent.bcn Avira Trojan.MulDrop.3337
TR/Agent.bcn Avira BackDoor.Bifrost.824
TR/Agent.bcn Avira Trojan.MulDrop.15380
TR/Agent.bcn Avira Trojan.MulDrop.10270
TR/Agent.bcn Avira Trojan.MulDrop.5072
TR/Agent.bcn Avira BackDoor.Bifrost.767
TR/Agent.bcn Avira Trojan.StartPage.20965
TR/Agent.bcn Avira BackDoor.Bifrost.765
TR/Agent.bcn Avira BackDoor.Bifrost.740
TR/Agent.bcn Avira BackDoor.Bifrost
TR/Agent.bcn Avira BackDoor.Bifrost.917
TR/Agent.bcn Avira BackDoor.Bifrost.906
TR/Agent.bcn Avira BackDoor.Bifrost.835
TR/Agent.bcn Avira Trojan.MulDrop.27760
TR/Agent.bcn Avira Trojan.MulDrop.11171
TR/Agent.bcn Avira BackDoor.Bifrost.647
TR/Agent.bcn Avira BackDoor.Bifrost.780
TR/Agent.bcn Avira Trojan.DownLoader.47231
TR/Agent.bcn Avira Trojan.MulDrop.5021
TR/Agent.bcn Avira BackDoor.IRC.Chazz.2
TR/Agent.bcn Avira BackDoor.IRC.Chazz.42
TR/Agent.bcn Avira BackDoor.Bifrost.834
TR/Agent.bcn Avira BackDoor.Bifrost.904
TR/Agent.bcn Avira Win32.HLLW.MyBot
TR/Agent.bcn Avira BackDoor.Bifrost.781
TR/Agent.bcn Avira Trojan.KeyLogger.3280
TR/Agent.bcn Avira Trojan.Siggen.62602
TR/Agent.bcn Avira Trojan.MulDrop.19121
TR/Agent.bcn Avira Trojan.MulDrop.16480
TR/Agent.bcn Avira Trojan.MulDrop1.4881
TR/Agent.bcn Avira Trojan.PWS.Lineage
TR/Agent.bcn Avira Win32.HLLW.Autoruner.14775
TR/Agent.bcn Avira Trojan.Siggen1.5650

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.