FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Malat aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Malat Microsoft BackDoor.Pigeon.288
Trojan:Win32/Malat Microsoft Trojan.Proxy.993
Trojan:Win32/Malat Microsoft Trojan.Siggen.1963
Trojan:Win32/Malat Microsoft Trojan.Fakealert.4943
Trojan:Win32/Malat Microsoft Trojan.PWS.Ggpass
Trojan:Win32/Malat Microsoft Win32.HLLW.Autoruner.6840
Trojan:Win32/Malat Microsoft Win32.HLLP.Whboy.111
Trojan:Win32/Malat Microsoft Trojan.PWS.Panda.117
Trojan:Win32/Malat Microsoft BackDoor.Bifrost.740
Trojan:Win32/Malat Microsoft Trojan.KeyLogger.3577
Trojan:Win32/Malat Microsoft Trojan.Inject.5512
Trojan:Win32/Malat Microsoft Trojan.Alupko.30
Trojan:Win32/Malat Microsoft Trojan.Inject.549
Trojan:Win32/Malat Microsoft Trojan.PWS.Banker.28051
Trojan:Win32/Malat Microsoft Trojan.PWS.Panda.4
Trojan:Win32/Malat Microsoft Trojan.PWS.Panda.112
Trojan:Win32/Malat Microsoft Trojan.DownLoad.36329
Trojan:Win32/Malat Microsoft Trojan.MulDrop.32694
Trojan:Win32/Malat Microsoft BackDoor.Pigeon.20805
Trojan:Win32/Malat Microsoft Trojan.Siggen.4836
Trojan:Win32/Malat Microsoft Trojan.MulDrop.34518
Trojan:Win32/Malat Microsoft Win32.HLLW.Lime.5
Trojan:Win32/Malat Microsoft Trojan.DownLoad.47368
Trojan:Win32/Malat Microsoft Trojan.Copyself.75
Trojan:Win32/Malat Microsoft BackDoor.Pushnik
Trojan:Win32/Malat Microsoft Trojan.Packed.511
Trojan:Win32/Malat Microsoft BackDoor.Fanchi
Trojan:Win32/Malat Microsoft Trojan.Packed.139
Trojan:Win32/Malat Microsoft Trojan.Packed.194
Trojan:Win32/Malat Microsoft Dialer.Netvision
Trojan:Win32/Malat Microsoft Trojan.DownLoad.38377
Trojan:Win32/Malat Microsoft Trojan.DownLoad.38374
Trojan:Win32/Malat Microsoft BackDoor.Bifrost.7
Trojan:Win32/Malat Microsoft Trojan.MulDrop.33739
Trojan:Win32/Malat Microsoft BackDoor.Generic.2008
Trojan:Win32/Malat Microsoft BackDoor.Warmy
Trojan:Win32/Malat Microsoft Trojan.Packed.431
Trojan:Win32/Malat Microsoft Trojan.DownLoad.5244
Trojan:Win32/Malat Microsoft Trojan.Winlock.63
Trojan:Win32/Malat Microsoft Trojan.Packed.293
Trojan:Win32/Malat Microsoft Trojan.Swizzor
Trojan:Win32/Malat Microsoft Trojan.Packed.494
Trojan:Win32/Malat Microsoft Trojan.PWS.Panda.114
Trojan:Win32/Malat Microsoft Trojan.PWS.Multi.34
Trojan:Win32/Malat Microsoft Trojan.DownLoader1.1475
Trojan:Win32/Malat Microsoft BackDoor.Bifrost.998
Trojan:Win32/Malat Microsoft Trojan.MulDrop.34347
Trojan:Win32/Malat Microsoft Trojan.PWS.Banker.29945
Trojan:Win32/Malat Microsoft DDoS.Siggen.6
Trojan:Win32/Malat Microsoft Trojan.Locker.12

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies