Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.DownLoader.47648
Win32/Malagent Microsoft Trojan.DownLoader.48891
Win32/Malagent Microsoft Trojan.DownLoader.48889
Win32/Malagent Microsoft Trojan.DownLoader.18948
Win32/Malagent Microsoft Trojan.DownLoader.23192
Win32/Malagent Microsoft Trojan.DownLoader.47370
Win32/Malagent Microsoft Trojan.DownLoader.46273
Win32/Malagent Microsoft Trojan.DownLoader.49253
Win32/Malagent Microsoft DDoS.PopSer
Win32/Malagent Microsoft Trojan.Click.16605
Win32/Malagent Microsoft Trojan.Click.1195
Win32/Malagent Microsoft BackDoor.Sturf
Win32/Malagent Microsoft Trojan.Click.1216
Win32/Malagent Microsoft Trojan.Click.1224
Win32/Malagent Microsoft Trojan.PWS.Animal
Win32/Malagent Microsoft Trojan.StartPage.1594
Win32/Malagent Microsoft Trojan.Click.16602
Win32/Malagent Microsoft Trojan.Click.16609
Win32/Malagent Microsoft Trojan.Disabler
Win32/Malagent Microsoft Trojan.Dapat
Win32/Malagent Microsoft Trojan.Click.16607
Win32/Malagent Microsoft Trojan.Click.16608
Win32/Malagent Microsoft Trojan.StartPage.1593
Win32/Malagent Microsoft Trojan.PWS.Winlog
Win32/Malagent Microsoft Trojan.StartPage.1604
Win32/Malagent Microsoft Trojan.StartPage.1612
Win32/Malagent Microsoft Trojan.PWS.Tencent
Win32/Malagent Microsoft Trojan.DownLoader.50781
Win32/Malagent Microsoft Trojan.DownLoader.47365
Win32/Malagent Microsoft Trojan.DownLoader.15659
Win32/Malagent Microsoft Trojan.DownLoader.50780
Win32/Malagent Microsoft Trojan.DownLoader.51703
Win32/Malagent Microsoft Trojan.DownLoader.53104
Win32/Malagent Microsoft Trojan.DownLoader.49185
Win32/Malagent Microsoft Trojan.DownLoader.51698
Win32/Malagent Microsoft Trojan.DownLoader.52540
Win32/Malagent Microsoft Trojan.PWS.Banker.17206
Win32/Malagent Microsoft Trojan.PWS.Banker.11685
Win32/Malagent Microsoft Trojan.PWS.Banker.14642
Win32/Malagent Microsoft Trojan.PWS.Banker.15576
Win32/Malagent Microsoft Trojan.PWS.Banker.11692
Win32/Malagent Microsoft Trojan.PWS.Qqrobber.269
Win32/Malagent Microsoft Trojan.PWS.Banker.14853
Win32/Malagent Microsoft Trojan.DownLoader.2008
Win32/Malagent Microsoft Trojan.DownLoader.51585
Win32/Malagent Microsoft Trojan.DownLoader.25138
Win32/Malagent Microsoft Trojan.DownLoader.24776
Win32/Malagent Microsoft Trojan.DownLoader.46967
Win32/Malagent Microsoft Trojan.DownLoader.50768
Win32/Malagent Microsoft Trojan.DownLoader.51588

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies