Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan-Downloader.Win32.Agent aliases:

Name Vendor Dr.Web classification name
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.Coresun.2
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.47757
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.49527
Trojan-Downloader.Win32.Agent VirusBlokAda BackDoor.Bulknet.214
Trojan-Downloader.Win32.Agent VirusBlokAda BackDoor.Kiddy.2
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.MulDrop.10946
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.NtRootKit.1051
Trojan-Downloader.Win32.Agent VirusBlokAda BackDoor.Bulknet.186
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.MulDrop.9741
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.26006
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.MulDrop.17047
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.Resun
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.61691
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.based
Trojan-Downloader.Win32.Agent VirusBlokAda Win32.HLLM.Limar.2383
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.MulDrop.12136
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.Click.18076
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.63429
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.MulDrop.11807
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.63567
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.Click.4341
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.PWS.Wsgame.9302
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.MulDrop.30400
Trojan-Downloader.Win32.Agent VirusBlokAda Win32.HLLM.Limar.2359
Trojan-Downloader.Win32.Agent VirusBlokAda Win32.HLLM.Limar.2400
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.Fakealert.760
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoad.31778
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoad.1134
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.PWS.LDPinch.4308
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.Click.17288
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.Fakealert.461
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.DownLoader.59496
Trojan-Downloader.Win32.Agent VirusBlokAda Trojan.PWS.LDPinch.1941
Trojan-Downloader.Win32.Agent SunBelt Trojan.MulDrop1.41676
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoad2.15043
Trojan-Downloader.Win32.Agent SunBelt Trojan.Siggen2.261
Trojan-Downloader.Win32.Agent SunBelt Trojan.MulDrop1.41585
Trojan-Downloader.Win32.Agent SunBelt Trojan.Siggen2.480
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoad1.64291
Trojan-Downloader.Win32.Agent SunBelt Trojan.Nineball.6
Trojan-Downloader.Win32.Agent SunBelt Trojan.Click.64312
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoad1.64290
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoad1.64285
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoad1.64282
Trojan-Downloader.Win32.Agent SunBelt Win32.HLLW.Facebook.844
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoader1.16717
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoader1.16693
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoader1.17142
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoader1.17143
Trojan-Downloader.Win32.Agent SunBelt Trojan.DownLoad1.64164

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.