Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Pws.Agent.IU aliases:

Name Vendor Dr.Web classification name
Trojan.Pws.Agent.IU BitDefender Trojan.PWS.Legmir.602
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.5287
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.775
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.3026
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.2911
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.9244
Trojan.Pws.Agent.IU BitDefender Trojan.DownLoader.12989
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.805
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8286
Trojan.Pws.Agent.IU BitDefender BackDoor.Graybird
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.6600
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8279
Trojan.Pws.Agent.IU BitDefender BackDoor.Huai.742
Trojan.Pws.Agent.IU BitDefender BackDoor.IRC.Sdbot.1881
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.3586
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.223
Trojan.Pws.Agent.IU BitDefender Trojan.DownLoader.15652
Trojan.Pws.Agent.IU BitDefender Trojan.PWS.Mof
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.587
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8960
Trojan.Pws.Agent.IU BitDefender Trojan.DownLoader.12792
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.2475
Trojan.Pws.Agent.IU BitDefender Trojan.Packed.194
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.7672
Trojan.Pws.Agent.IU BitDefender BackDoor.Huai.1748
Trojan.Pws.Agent.IU BitDefender BackDoor.Plunix
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8028
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.2786
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.1579
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.4908
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.4909
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.4978
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.4973
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8949
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.6643
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8460
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.7045
Trojan.Pws.Agent.IU BitDefender Trojan.MulDrop.3920
Trojan.Pws.Agent.IU BitDefender Trojan.PWS.Ran
Trojan.Pws.Agent.IU BitDefender Trojan.DownLoader.51140
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.83
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.2389
Trojan.Pws.Agent.IU BitDefender BackDoor.Rpcs.78
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.1164
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.850
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.460
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.1277
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8475
Trojan.Pws.Agent.IU BitDefender BackDoor.Pigeon.8817
Trojan.Pws.Agent.IU BitDefender Trojan.PWS.Qqpass.760

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.