Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Spambot.3099 aliases:

Name Vendor Dr.Web classification name
SPR/Spam.Agent.GE.1 Avira Trojan.Spambot.3099
WinNT/Tedroo.B Microsoft Trojan.Spambot.3099
SpamTool.Win32.Agent.ge Kaspersky Trojan.Spambot.3099
SpamTool.Win32.Agent.ge VirusBlokAda Trojan.Spambot.3099
SpamTool.BLB AVG Trojan.Spambot.3099
Trojan.Agent.AHUD BitDefender Trojan.Spambot.3099
TROJ_SPAMTOOL.BU Trend Micro Trojan.Spambot.3099
TR/Crypt.ULPM.Gen Avira Trojan.Spambot.3099
Win32/Tedroo.H Microsoft Trojan.Spambot.3099
SpamTool.Win32.Agent.if Kaspersky Trojan.Spambot.3099
SpamTool.Win32.Agent.if VirusBlokAda Trojan.Spambot.3099
TROJ_SHEUR.CLG Trend Micro Trojan.Spambot.3099
TROJ_AGENT.NCQ Trend Micro Trojan.Spambot.3099
TR/Agent.ips Avira Trojan.Spambot.3099
Trojan.Win32.Agent.ips Kaspersky Trojan.Spambot.3099
SpamTool.Win32.Agent.hf Kaspersky Trojan.Spambot.3099
Trojan.Spambot.3099 VirusBlokAda Trojan.Spambot.3099
Trojan.Agent.AHVR BitDefender Trojan.Spambot.3099
Win32/Grum.G Microsoft Trojan.Spambot.3099
Trojan.Win32.Agent.jfp Kaspersky Trojan.Spambot.3099
Trojan.Kobcka.EQ BitDefender Trojan.Spambot.3099
Trojan.Win32.Agent.jfj Kaspersky Trojan.Spambot.3099
Trojan.Win32.Agent.jfj VirusBlokAda Trojan.Spambot.3099
Trojan.Agent.AHXA BitDefender Trojan.Spambot.3099
Spammer:Win32/Tedroo.H Microsoft Trojan.Spambot.3099
Spam-Mailbot!RootKit McAfee Trojan.Spambot.3099
Virus:Win32/Grum.G Microsoft Trojan.Spambot.3099
Generic.dx McAfee Trojan.Spambot.3099
SpamTool.Win32.Agent.iv Kaspersky Trojan.Spambot.3099
Trojan.Spambot.3099 VirusBlokAda Trojan.Packed.573

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.