Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanProxy:Win32/Agent aliases:

Name Vendor Dr.Web classification name
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.750
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.771
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.2364
TrojanProxy:Win32/Agent Microsoft Trojan.Egor.15
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.3754
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1429
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1426
TrojanProxy:Win32/Agent Microsoft BackDoor.Salidol
TrojanProxy:Win32/Agent Microsoft BackDoor.Activ
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.19425
TrojanProxy:Win32/Agent Microsoft Trojan.PWS.Qqpass.985
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.19436
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.22134
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1783
TrojanProxy:Win32/Agent Microsoft BackDoor.Firepass
TrojanProxy:Win32/Agent Microsoft Trojan.PWS.Lineage
TrojanProxy:Win32/Agent Microsoft Trojan.Muppy
TrojanProxy:Win32/Agent Microsoft Trojan.Spambot.2922
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.70
TrojanProxy:Win32/Agent Microsoft Trojan.SpmBot
TrojanProxy:Win32/Agent Microsoft DDoS.Carvan
TrojanProxy:Win32/Agent Microsoft BackDoor.Shellbot
TrojanProxy:Win32/Agent Microsoft BackDoor.Kamsos.6
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1935
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.27481
TrojanProxy:Win32/Agent Microsoft Trojan.Egor
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.27479
TrojanProxy:Win32/Agent Microsoft BackDoor.Sini
TrojanProxy:Win32/Agent Microsoft Trojan.Click.1982
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1974
TrojanProxy:Win32/Agent Microsoft Trojan.PWS.Nethelper
TrojanProxy:Win32/Agent Microsoft Trojan.PWS.GoldSpy
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1973
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1971
TrojanProxy:Win32/Agent Microsoft Trojan.PWS.Gamania.2394
TrojanProxy:Win32/Agent Microsoft Trojan.PWS.Gamania.2856
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1972
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1970
TrojanProxy:Win32/Agent Microsoft Trojan.PWS.Soul
TrojanProxy:Win32/Agent Microsoft BackDoor.Faalken
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.27480
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.72
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.45885
TrojanProxy:Win32/Agent Microsoft BackDoor.Checkban
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1406
TrojanProxy:Win32/Agent Microsoft Trojan.Spambot
TrojanProxy:Win32/Agent Microsoft Trojan.Chiwe
TrojanProxy:Win32/Agent Microsoft BackDoor.Ramha
TrojanProxy:Win32/Agent Microsoft Trojan.DownLoader.19495
TrojanProxy:Win32/Agent Microsoft Trojan.Proxy.1353

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.