Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Injector.AG aliases:

Name Vendor Dr.Web classification name
Trojan.Injector.AG BitDefender Trojan.MulDrop.14549
Trojan.Injector.AG BitDefender Trojan.MulDrop.14548
Trojan.Injector.AG BitDefender Trojan.MulDrop.12466
Trojan.Injector.AG BitDefender Trojan.MulDrop.13089
Trojan.Injector.AG BitDefender Trojan.PWS.Swz.16
Trojan.Injector.AG BitDefender BackDoor.Poison.22
Trojan.Injector.AG BitDefender BackDoor.Poison.11
Trojan.Injector.AG BitDefender BackDoor.Poison.21
Trojan.Injector.AG BitDefender BackDoor.Poison.16
Trojan.Injector.AG BitDefender Trojan.MulDrop.6451
Trojan.Injector.AG BitDefender BackDoor.IRC.Sdbot.3643
Trojan.Injector.AG BitDefender Trojan.MulDrop.6195
Trojan.Injector.AG BitDefender Trojan.PWS.Gamania.9778
Trojan.Injector.AG BitDefender BackDoor.Poison.18
Trojan.Injector.AG BitDefender BackDoor.Poison.13
Trojan.Injector.AG BitDefender BackDoor.Poison.17
Trojan.Injector.AG BitDefender Trojan.MulDrop.13323
Trojan.Injector.AG BitDefender Trojan.MulDrop.14550
Trojan.Injector.AG BitDefender Trojan.MulDrop.6417
Trojan.Injector.AG BitDefender Trojan.MulDrop.8669
Trojan.Injector.AG BitDefender Trojan.MulDrop.8895
Trojan.Injector.AG BitDefender Trojan.MulDrop.8846
Trojan.Injector.AG BitDefender Trojan.MulDrop.8940
Trojan.Injector.AG BitDefender Trojan.MulDrop.8943
Trojan.Injector.AG BitDefender BackDoor.WebDor
Trojan.Injector.AG BitDefender Trojan.MulDrop.4658
Trojan.Injector.AG BitDefender Trojan.MulDrop.7908
Trojan.Injector.AG BitDefender BackDoor.Poison
Trojan.Injector.AG BitDefender Trojan.MulDrop.9774
Trojan.Injector.AG BitDefender Trojan.MulDrop.4905
Trojan.Injector.AG BitDefender Trojan.DownLoader.51051
Trojan.Injector.AG BitDefender BackDoor.Poison.20
Trojan.Injector.AG BitDefender BackDoor.Poison.19
Trojan.Injector.AG BitDefender BackDoor.Poison.15
Trojan.Injector.AG BitDefender Trojan.MulDrop.13819
Trojan.Injector.AG BitDefender Trojan.MulDrop.5643
Trojan.Injector.AG BitDefender Trojan.MulDrop.13112
Trojan.Injector.AG BitDefender BackDoor.Havar.53
Trojan.Injector.AG BitDefender BackDoor.Fonly
Trojan.Injector.AG BitDefender BackDoor.Bifrost
Trojan.Injector.AG BitDefender Win32.HLLM.Netsky.18351
Trojan.Injector.AG BitDefender Trojan.MulDrop.29847
Trojan.Injector.AG BitDefender Trojan.MulDrop.27760
Trojan.Injector.AG BitDefender BackDoor.Poison.664
Trojan.Injector.AG BitDefender Win32.HLLM.Netsky.18353
Trojan.Injector.AG BitDefender Trojan.MulDrop.13710
Trojan.Injector.AG BitDefender BackDoor.Poison.10
Trojan.Injector.AG BitDefender Win32.HLLM.Netsky.18352
Trojan.Injector.AG BitDefender BackDoor.Havar
Trojan.Injector.AG BitDefender Trojan.PWS.Stealer.129

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.