Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan-Downloader.Win32.Agent.mp aliases:

Name Vendor Dr.Web classification name
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.DownLoader.1281
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.ProRat.32
Trojan-Downloader.Win32.Agent.mp Kaspersky Win32.HLLW.MyBot
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.IRC.Sdbot.816
Trojan-Downloader.Win32.Agent.mp Kaspersky Win32.HLLW.SpyBot
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.IRC.Sdbot.899
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.Inject.764
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.DownLoader.1281
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.Bifrost.740
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Win32.HLLW.SpyBot
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.MulDrop.6807
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.Bulknet.67
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.IRC.Sdbot.2265
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.IRC.Sdbot.2265
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.MulDrop.14408
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.MulDrop.14408
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.Pigeon.11631
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.Pigeon.11631
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.MulDrop.9128
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.MulDrop.8960
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.MulDrop.8960
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.MulDrop.8959
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.MulDrop.8959
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.DownLoader.18408
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.Dosia
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.Dosia
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.IRC.Sdbot.677
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.DownLoader.18410
Trojan-Downloader.Win32.Agent.mp Kaspersky Win32.HLLW.SpyBot.93
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.MulDrop.3130
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.Bandook.30
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.Iauh
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.Iauh
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.Optix.168
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.DownLoader.44800
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.DownLoader.44800
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.Inject.764
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.Inject.763
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.Inject.763
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.Troll
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.Iroffer.1427
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.Iroffer.1427
Trojan-Downloader.Win32.Agent.mp Kaspersky BackDoor.Pigeon.7264
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.Pigeon.7264
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.MulDrop.310
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.MulDrop.310
Trojan-Downloader.Win32.Agent.mp VirusBlokAda BackDoor.IRC.Sdbot.899
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.DownLoader.47055
Trojan-Downloader.Win32.Agent.mp VirusBlokAda Trojan.DownLoader.18409
Trojan-Downloader.Win32.Agent.mp Kaspersky Trojan.DownLoader.27994

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.