Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/AgentBypass.gen!K aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.Inject.59
Trojan:Win32/AgentBypass.gen!K Microsoft DDoS.Rincux.143
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Gamania.7932
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Gamania.10824
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Gamania.10782
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.Nsanti.Packed
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.2486
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.6330
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.33427
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.Inject.6287
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.30199
Trojan:Win32/AgentBypass.gen!K Microsoft BackDoor.Sin.25
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.5475
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.5967
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.5538
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.5961
Trojan:Win32/AgentBypass.gen!K Microsoft BackDoor.Dllka
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.20785
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.Packed.560
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoad.904
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Gamania.10823
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Gamania.10825
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.6439
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.6602
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoad.885
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.11100
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.20641
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.6377
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.6473
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.6332
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.6440
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.42540
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.5008
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.37731
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Pasdev
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.4601
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.28289
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.47047
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.14116
Trojan:Win32/AgentBypass.gen!K Microsoft BackDoor.Moons
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Gamania.11783
Trojan:Win32/AgentBypass.gen!K Microsoft Win32.IRC.Bot.92
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.56775
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.5965
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.5966
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Gamania.11229
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.PWS.Wsgame.5962
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.24002
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.14399
Trojan:Win32/AgentBypass.gen!K Microsoft Trojan.DownLoader.10366

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.