Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Agent aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Agent Microsoft Trojan.Yaspy
Backdoor:Win32/Agent Microsoft Win32.HLLW.Share
Backdoor:Win32/Agent Microsoft Trojan.Click.993
Backdoor:Win32/Agent Microsoft Trojan.DownLoader.11389
Backdoor:Win32/Agent Microsoft Trojan.PWS.Stealer.129
Backdoor:Win32/Agent Microsoft Trojan.MulDrop.4150
Backdoor:Win32/Agent Microsoft BackDoor.Shell
Backdoor:Win32/Agent Microsoft BackDoor.Furax
Backdoor:Win32/Agent Microsoft BackDoor.Xconf.27
Backdoor:Win32/Agent Microsoft BackDoor.Mithril
Backdoor:Win32/Agent Microsoft Trojan.MulDrop.9320
Backdoor:Win32/Agent Microsoft Trojan.StartPage.601
Backdoor:Win32/Agent Microsoft BackDoor.Pigeon.7212
Backdoor:Win32/Agent Microsoft BackDoor.Lay
Backdoor:Win32/Agent Microsoft BackDoor.Noko
Backdoor:Win32/Agent Microsoft BackDoor.Fibi
Backdoor:Win32/Agent Microsoft BackDoor.Fehl
Backdoor:Win32/Agent Microsoft Trojan.MulDrop.6130
Backdoor:Win32/Agent Microsoft Trojan.MulDrop.16737
Backdoor:Win32/Agent Microsoft Trojan.Spambot.2571
Backdoor:Win32/Agent Microsoft Trojan.MulDrop.13062
Backdoor:Win32/Agent Microsoft Trojan.MulDrop.6362
Backdoor:Win32/Agent Microsoft Trojan.PWS.Banker.21274
Backdoor:Win32/Agent Microsoft Trojan.PWS.Banker.12099
Backdoor:Win32/Agent Microsoft Trojan.Perfiler
Backdoor:Win32/Agent Microsoft Trojan.DownLoader.46836
Backdoor:Win32/Agent Microsoft Trojan.Flooder.6
Backdoor:Win32/Agent Microsoft Trojan.DownLoader.28740
Backdoor:Win32/Agent Microsoft Trojan.PWS.Bobe
Backdoor:Win32/Agent Microsoft BackDoor.Xconf.22
Backdoor:Win32/Agent Microsoft BackDoor.Servu.60
Backdoor:Win32/Agent Microsoft BackDoor.Rmt
Backdoor:Win32/Agent Microsoft Trojan.Inject.622
Backdoor:Win32/Agent Microsoft Trojan.DownLoader.50255
Backdoor:Win32/Agent Microsoft Trojan.Proxy.1859
Backdoor:Win32/Agent Microsoft BackDoor.Pigeon.9167
Backdoor:Win32/Agent Microsoft BackDoor.Bolg
Backdoor:Win32/Agent Microsoft BackDoor.Beizhu.1084
Backdoor:Win32/Agent Microsoft BackDoor.TT
Backdoor:Win32/Agent Microsoft BackDoor.Rejoice
Backdoor:Win32/Agent Microsoft BackDoor.Funsecs
Backdoor:Win32/Agent Microsoft BackDoor.Simserv
Backdoor:Win32/Agent Microsoft BackDoor.Pigeon.7071
Backdoor:Win32/Agent Microsoft BackDoor.CmjSpy.190
Backdoor:Win32/Agent Microsoft BackDoor.Tamer
Backdoor:Win32/Agent Microsoft BackDoor.EggDrop.1634
Backdoor:Win32/Agent Microsoft BackDoor.Gupt
Backdoor:Win32/Agent Microsoft BackDoor.Sabason
Backdoor:Win32/Agent Microsoft BackDoor.Skd.20
Backdoor:Win32/Agent Microsoft Trojan.PWS.Gamania

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.