Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Bagle aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45120
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45070
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.219
TrojanDownloader:Win32/Bagle Microsoft Trojan.AVKill.255
TrojanDownloader:Win32/Bagle Microsoft Trojan.DownLoader.22898
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45121
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45124
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45127
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45129
TrojanDownloader:Win32/Bagle Microsoft Trojan.MulDrop.3503
TrojanDownloader:Win32/Bagle Microsoft Trojan.MulDrop.3502
TrojanDownloader:Win32/Bagle Microsoft Trojan.DownLoader.8593
TrojanDownloader:Win32/Bagle Microsoft Trojan.Gigagen
TrojanDownloader:Win32/Bagle Microsoft Trojan.BeagleProxy
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.36352
TrojanDownloader:Win32/Bagle Microsoft Trojan.DownLoader.3684
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.12288
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.9158
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45105
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45125
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45184
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.220
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.216
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.45182
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLW.Autoruner.1905
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.215
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.222
TrojanDownloader:Win32/Bagle Microsoft Trojan.DownLoader.4959
TrojanDownloader:Win32/Bagle Microsoft Trojan.Packed.650
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.3317
TrojanDownloader:Win32/Bagle Microsoft Trojan.MulDrop.3510
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.253
TrojanDownloader:Win32/Bagle Microsoft Trojan.MulDrop.4527
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.431
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.334
TrojanDownloader:Win32/Bagle Microsoft Win32.HLLM.Beagle.330

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.