Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Agent aliases:

Name Vendor Dr.Web classification name
Win32/Agent Microsoft Trojan.MulDrop.3532
Win32/Agent Microsoft Trojan.MulDrop.5860
Win32/Agent Microsoft Trojan.MulDrop.1378
Win32/Agent Microsoft Trojan.MulDrop.7015
Win32/Agent Microsoft Trojan.MulDrop.4611
Win32/Agent Microsoft Trojan.MulDrop.3120
Win32/Agent Microsoft Trojan.Spambot.2703
Win32/Agent Microsoft Trojan.Spambot.2838
Win32/Agent Microsoft Trojan.Spambot.2702
Win32/Agent Microsoft Trojan.Spambot.2771
Win32/Agent Microsoft Trojan.Starter
Win32/Agent Microsoft Trojan.Rawlam
Win32/Agent Microsoft Trojan.Flashfxp
Win32/Agent Microsoft BackDoor.Cia.26
Win32/Agent Microsoft BackDoor.IRC.Muma
Win32/Agent Microsoft BackDoor.IRC.Mfv
Win32/Agent Microsoft Trojan.DownLoader.7047
Win32/Agent Microsoft Trojan.DownLoader.7265
Win32/Agent Microsoft Trojan.DownLoader.8074
Win32/Agent Microsoft Trojan.DownLoader.8141
Win32/Agent Microsoft Trojan.DownLoader.7322
Win32/Agent Microsoft Trojan.DownLoader.7111
Win32/Agent Microsoft Trojan.DownLoader.7633
Win32/Agent Microsoft Trojan.DownLoader.7664
Win32/Agent Microsoft Trojan.DownLoader.7567
Win32/Agent Microsoft Trojan.StartPage.1211
Win32/Agent Microsoft Trojan.PWS.Phc
Win32/Agent Microsoft Trojan.Proxy.670
Win32/Agent Microsoft Trojan.Proxy.673
Win32/Agent Microsoft Trojan.Proxy.651
Win32/Agent Microsoft Trojan.Sniff
Win32/Agent Microsoft Trojan.PWS.Rgb
Win32/Agent Microsoft Trojan.Proxy.672
Win32/Agent Microsoft Trojan.Proxy.658
Win32/Agent Microsoft Trojan.Proxy.550
Win32/Agent Microsoft Win32.HLLW.Generic.182
Win32/Agent Microsoft Trojan.Proxy.679
Win32/Agent Microsoft Qq.Generator
Win32/Agent Microsoft BackDoor.Dustin
Win32/Agent Microsoft Trojan.DownLoader.6206
Win32/Agent Microsoft Trojan.DownLoader.25988
Win32/Agent Microsoft Dialer.Midl
Win32/Agent Microsoft Adware.SearchTwo
Win32/Agent Microsoft Trojan.DownLoader.601
Win32/Agent Microsoft Trojan.Proxy.1861
Win32/Agent Microsoft Trojan.Proxy.340
Win32/Agent Microsoft Trojan.MulDrop.2183
Win32/Agent Microsoft Trojan.Ptop
Win32/Agent Microsoft Trojan.MulDrop.2189
Win32/Agent Microsoft Trojan.Proxy.357

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.