Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanProxy:Win32/Agent.AYY aliases:

Name Vendor Dr.Web classification name
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.MulDrop.10409
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Inject.290
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.DarkMoon.120
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.Diho
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.2766
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Click.18767
TrojanProxy:Win32/Agent.AYY Microsoft Win32.HLLW.Autoruner.2298
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoader.35885
TrojanProxy:Win32/Agent.AYY Microsoft Win32.HLLW.Autoruner.1060
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.Bifrost.917
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.IRC.Sdbot.2534
TrojanProxy:Win32/Agent.AYY Microsoft Tool.Adump.12
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.MulDrop.6816
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.Bifrost
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.377
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.2077
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.Chaj
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.Flux.101
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.BOrifice.11
TrojanProxy:Win32/Agent.AYY Microsoft Tool.PassView
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.1336
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoad.44
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.974
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.1186
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.PSClient
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.537
TrojanProxy:Win32/Agent.AYY Microsoft Adware.nCase
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoader.37578
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.2879
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.3038
TrojanProxy:Win32/Agent.AYY Microsoft Dialer.Xxxdef
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.PWS.LDPinch.3420
TrojanProxy:Win32/Agent.AYY Microsoft Adware.Cast
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Click.3443
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoad1.37193
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoader.26894
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoader.48958
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoader.10622
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.Bifrost.74
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Siggen1.6062
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Proxy.692
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.PWS.Spy.4374
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.DownLoad.57047
TrojanProxy:Win32/Agent.AYY Microsoft Trojan.Siggen.21504
TrojanProxy:Win32/Agent.AYY Microsoft BackDoor.Pigeon.28824

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.