Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Downloader.Agent.ZCR in virus library:

A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.

Trojan.Downloader.Agent.ZCR aliases:

Name Vendor Dr.Web classification name
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Inject.3299
Trojan.Downloader.Agent.ZCR BitDefender Trojan.KeyLogger.2331
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison.40
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.12389
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison.1
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.64589
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.50820
Trojan.Downloader.Agent.ZCR BitDefender Trojan.PWS.LDPinch.3420
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Inject.3632
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.50818
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.63190
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Packed.519
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.54367
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Pigeon.194
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.14080
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Packed.518
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.6888
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.46203
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.59319
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Proxy.3103
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.12716
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.56884
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.49429
Trojan.Downloader.Agent.ZCR BitDefender Trojan.KeyLogger.1833
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Inject.3264
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.15437
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Inject.3029
Trojan.Downloader.Agent.ZCR BitDefender Trojan.KeyLogger.1873
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Hooker.21075
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Inject.3329
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Inject.3333
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.6284
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.16453
Trojan.Downloader.Agent.ZCR BitDefender Win32.Virut.36
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Packed.158
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.63485
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoader.35885
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.DarkMoon.143
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison.743
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison.699
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison.710
Trojan.Downloader.Agent.ZCR BitDefender Trojan.Inject.5405
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison.686
Trojan.Downloader.Agent.ZCR BitDefender Trojan.MulDrop.30372
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoad.9302
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoad.26727
Trojan.Downloader.Agent.ZCR BitDefender BackDoor.Poison.61
Trojan.Downloader.Agent.ZCR BitDefender Trojan.DownLoad.25745
Trojan.Downloader.Agent.ZCR BitDefender Tool.MailPassView.133

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.