Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Recycle aliases:

Name Vendor Dr.Web classification name
FakeRecycled McAfee Trojan.Recycle
TR/VB.aqt.18 Avira Trojan.Recycle
Trojan:Win32/VB Microsoft Trojan.Recycle
Trojan.Win32.VB.aqt VirusBlokAda Trojan.Recycle
Generic4.EO AVG Trojan.Recycle
Trojan.VB.FakeRecycled.C BitDefender Trojan.Recycle
Generic.ZWE AVG Trojan.Recycle
Trojan.Win32.VB.aqt Kaspersky Trojan.Recycle
Win32.Worm.Fujacks.AJ BitDefender Trojan.Recycle
WORM_FUJACKS.AX Trend Micro Trojan.Recycle
INF/FakeRecycled E-Trust Trojan.Recycle
WORM_Generic Trend Micro Trojan.Recycle
Generic3.GIB AVG Trojan.Recycle
Trojan-Dropper.Win32.Small.avc Kaspersky Trojan.Recycle
Trojan.Vb.AQT BitDefender Trojan.Recycle
WORM_VB.BDN Trend Micro Trojan.Recycle
W32/Trojan.XUP F-Prot Trojan.Recycle
Win32/FakeRecycled.A E-Trust Trojan.Recycle
Generic3.HVZ AVG Trojan.Recycle
TR/VB.aqt.5 Avira Trojan.Recycle
Trojan:Win32/Fakerecy.A Microsoft Trojan.Recycle
Trojan.Win32.VB.AQT VirusBlokAda Trojan.Recycle
Generic2.OJ AVG Trojan.Recycle
TR/VB.FakeRecycled.C Avira Trojan.Recycle
BDS/Agent.SR.3 Avira Trojan.Recycle
Generic.dx McAfee Trojan.Recycle
Backdoor.Win32.Agent.sr Kaspersky Trojan.Recycle
BackDoor.Agent.DLH AVG Trojan.Recycle
Backdoor.Agent.SR BitDefender Trojan.Recycle
WORM_AGENT.HLN Trend Micro Trojan.Recycle
TR/VB.aqt.7 Avira Trojan.Recycle
Win32/Fakerecy.A Microsoft Trojan.Recycle
TR/VB.aqt.2 Avira Trojan.Recycle
TR/Autorun.EV Avira Trojan.Recycle
Generic!atr McAfee Trojan.Recycle
Worm.Win32.VB.fi Kaspersky Trojan.Recycle
Worm/AutoRun AVG Trojan.Recycle
Trojan.Recycle.B BitDefender Trojan.Recycle
Mal_Otorun1 Trend Micro Trojan.Recycle
TR/VB.aqt.27 Avira Trojan.Recycle
TR/VB.aqt.1 Avira Trojan.Recycle
Generic8.LOD AVG Trojan.Recycle
Trojan.Recycle.D BitDefender Trojan.Recycle
W32/Bacalid.A Avira Trojan.Recycle
W32/Bacalid.gen McAfee Trojan.Recycle
Worm.Win32.Detnat.e Kaspersky Trojan.Recycle
Win32/Bacalid AVG Trojan.Recycle
PE_VBAC.A Trend Micro Trojan.Recycle
Generic BackDoor.u McAfee Trojan.Recycle
Win32/Agent Microsoft Trojan.Recycle

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.