Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Agent.B aliases:

Name Vendor Dr.Web classification name
Win32/Agent.B AVG Trojan.Starter.217
Win32/Agent.B Microsoft Trojan.DownLoader.7636
Win32/Agent.B Microsoft Trojan.DownLoader.7644
Win32/Agent.B Microsoft Trojan.MulDrop.1466
Win32/Agent.B Microsoft Trojan.DownLoader.568
Win32/Agent.B Microsoft Trojan.DownLoader.2054
Win32/Agent.B Microsoft Trojan.MulDrop.1511
Win32/Agent.B Microsoft Trojan.DownLoader.435
Win32/Agent.B Microsoft Trojan.PWS.Htool
Win32/Agent.B Microsoft Trojan.StartPage.471
Win32/Agent.B Microsoft Trojan.DownLoader.2027
Win32/Agent.B Microsoft BackDoor.Netag
Win32/Agent.B Microsoft BackDoor.GoldSun
Win32/Agent.B Microsoft Trojan.DownLoader.1918
Win32/Agent.B Microsoft Trojan.DownLoader.3225
Win32/Agent.B Microsoft Win32.HLLM.Beagle.19968
Win32/Agent.B Microsoft Trojan.MulDrop.1648
Win32/Agent.B Microsoft BackDoor.IRC.Fuxor
Win32/Agent.B Microsoft Adware.GloboSearch
Win32/Agent.B Microsoft Trojan.DChange
Win32/Agent.B Microsoft Win32.HLLP.Gedzac.48573
Win32/Agent.B Microsoft Trojan.Feat.11
Win32/Agent.B Microsoft Trojan.ProxySniff
Win32/Agent.B Microsoft Trojan.PWS.Fehler
Win32/Agent.B Microsoft Trojan.Feat.2
Win32/Agent.B Microsoft Trojan.DownLoader.4944
Win32/Agent.B Microsoft Trojan.Hidn
Win32/Agent.B Microsoft Trojan.DownLoader.3312
Win32/Agent.B Microsoft Trojan.DownLoader.3515
Win32/Agent.B Microsoft Trojan.DownLoader.3367
Win32/Agent.B Microsoft Trojan.DownLoader.3327
Win32/Agent.B Microsoft Trojan.Iespy
Win32/Agent.B Microsoft Trojan.DownLoader.3419
Win32/Agent.B Microsoft Trojan.Click.1192
Win32/Agent.B Microsoft Trojan.PWS.Goft
Win32/Agent.B Microsoft Trojan.DownLoader.1518
Win32/Agent.B Microsoft Trojan.KillFiles
Win32/Agent.B Microsoft Trojan.Isbar.199
Win32/Agent.B Microsoft Trojan.DownLoader.1169
Win32/Agent.B Microsoft Trojan.DownLoader.1131
Win32/Agent.B Microsoft Trojan.DownLoader.1158
Win32/Agent.B Microsoft Trojan.DownLoader.1130
Win32/Agent.B Microsoft Trojan.DownLoader.8794
Win32/Agent.B Microsoft Win32.HLLW.Texmer.35
Win32/Agent.B Microsoft Trojan.Click.1504
Win32/Agent.B Microsoft Trojan.DownLoader.13189
Win32/Agent.B Microsoft Trojan.DownLoader.13201
Win32/Agent.B Microsoft Win32.HLLW.Tiged
Win32/Agent.B Microsoft Trojan.DownLoader.1797
Win32/Agent.B Microsoft Trojan.DownLoader.2128

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.