Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Drop.Agen.26778.A aliases:

Name Vendor Dr.Web classification name
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3601
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3261
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3415
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3596
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3664
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3579
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3238
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3451
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3469
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3161
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3536
TR/Drop.Agen.26778.A Avira Trojan.PWS.Wow.623
TR/Drop.Agen.26778.A Avira Trojan.PWS.Wow.622
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3710
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3712
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3611
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3619
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3608
TR/Drop.Agen.26778.A Avira Win32.Virut.5
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3483
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3553
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3650
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3260
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3615
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3262
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3649
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3580
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3658
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3517
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3487
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3530
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3686
TR/Drop.Agen.26778.A Avira Trojan.PWS.Wow
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3578
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3886
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3997
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.4018
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.4260
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3661
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3929
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.4295
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3999
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3881
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.4016
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3662
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3885
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3302
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3531
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3605
TR/Drop.Agen.26778.A Avira Trojan.PWS.Gamania.3510

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.