Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Agent aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Agent Microsoft Trojan.ProAgent.25
Trojan:Win32/Agent Microsoft Trojan.StartPage.1294
Trojan:Win32/Agent Microsoft Trojan.Mayouch
Trojan:Win32/Agent Microsoft Trojan.Inject.322
Trojan:Win32/Agent Microsoft FDOS.Vig
Trojan:Win32/Agent Microsoft Trojan.DownLoader.10883
Trojan:Win32/Agent Microsoft Trojan.KeyLogger.563
Trojan:Win32/Agent Microsoft Trojan.MulDrop.3502
Trojan:Win32/Agent Microsoft Trojan.MulDrop.4024
Trojan:Win32/Agent Microsoft BackDoor.IRC.Sdbot.1881
Trojan:Win32/Agent Microsoft BackDoor.Pigeon.17491
Trojan:Win32/Agent Microsoft Trojan.PWS.Banker.14325
Trojan:Win32/Agent Microsoft BackDoor.Moocat
Trojan:Win32/Agent Microsoft Trojan.PWS.Gamania.7516
Trojan:Win32/Agent Microsoft Trojan.MulDrop.5037
Trojan:Win32/Agent Microsoft Adware.IELite
Trojan:Win32/Agent Microsoft Adware.Yep.9
Trojan:Win32/Agent Microsoft Adware.GloboSearch
Trojan:Win32/Agent Microsoft BackDoor.EggDrop
Trojan:Win32/Agent Microsoft BackDoor.Doker
Trojan:Win32/Agent Microsoft Trojan.MulDrop.6514
Trojan:Win32/Agent Microsoft Trojan.MulDrop.5520
Trojan:Win32/Agent Microsoft Trojan.MulDrop.4611
Trojan:Win32/Agent Microsoft Trojan.MulDrop.10428
Trojan:Win32/Agent Microsoft Trojan.Mock.2
Trojan:Win32/Agent Microsoft Adware.Adpower
Trojan:Win32/Agent Microsoft Trojan.PWS.Wsgame.5529
Trojan:Win32/Agent Microsoft Trojan.DownLoader.63600
Trojan:Win32/Agent Microsoft Trojan.Tost
Trojan:Win32/Agent Microsoft Adware.Yep
Trojan:Win32/Agent Microsoft Trojan.IehookSpy
Trojan:Win32/Agent Microsoft Trojan.DragonBot
Trojan:Win32/Agent Microsoft Trojan.Click.18003
Trojan:Win32/Agent Microsoft Trojan.Cinco
Trojan:Win32/Agent Microsoft Trojan.Click.2507
Trojan:Win32/Agent Microsoft BackDoor.Gupt.12
Trojan:Win32/Agent Microsoft Trojan.Johnny
Trojan:Win32/Agent Microsoft Adware.Websearch.5
Trojan:Win32/Agent Microsoft Trojan.Wallet
Trojan:Win32/Agent Microsoft BackDoor.Pigeon.1238
Trojan:Win32/Agent Microsoft Trojan.MulDrop.13064
Trojan:Win32/Agent Microsoft Trojan.MulDrop.5616
Trojan:Win32/Agent Microsoft Trojan.Vqten
Trojan:Win32/Agent Microsoft Trojan.Click.17797
Trojan:Win32/Agent Microsoft Trojan.Peflog.169
Trojan:Win32/Agent Microsoft Trojan.MulDrop.12292
Trojan:Win32/Agent Microsoft Adware.IEHelper
Trojan:Win32/Agent Microsoft Trojan.PWS.Gamania.3022
Trojan:Win32/Agent Microsoft Trojan.ProAgent.30
Trojan:Win32/Agent Microsoft Trojan.MulDrop.7948

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.