Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft FDOS.MailSpam
Win32/Malagent Microsoft Trojan.DownLoader.7812
Win32/Malagent Microsoft Trojan.Click.17985
Win32/Malagent Microsoft Trojan.DownLoader.37210
Win32/Malagent Microsoft BackDoor.Huai.2729
Win32/Malagent Microsoft Trojan.Proxy.728
Win32/Malagent Microsoft Trojan.DownLoader.37258
Win32/Malagent Microsoft Trojan.Proxy.725
Win32/Malagent Microsoft BackDoor.IRC.Sdbot.2816
Win32/Malagent Microsoft Trojan.DownLoader.37132
Win32/Malagent Microsoft Trojan.DownLoader.37190
Win32/Malagent Microsoft Trojan.DownLoader.37255
Win32/Malagent Microsoft Trojan.DownLoader.37115
Win32/Malagent Microsoft DDoS.Rincux
Win32/Malagent Microsoft Trojan.DownLoader.37136
Win32/Malagent Microsoft Trojan.DownLoader.37234
Win32/Malagent Microsoft Trojan.DownLoader.37151
Win32/Malagent Microsoft Trojan.DownLoader.37161
Win32/Malagent Microsoft Trojan.DownLoader.37245
Win32/Malagent Microsoft Trojan.DownLoader.37130
Win32/Malagent Microsoft Trojan.DownLoader.37090
Win32/Malagent Microsoft Trojan.DownLoader.37235
Win32/Malagent Microsoft Trojan.DownLoader.37215
Win32/Malagent Microsoft Trojan.DownLoader.37128
Win32/Malagent Microsoft Trojan.DownLoader.37075
Win32/Malagent Microsoft Trojan.DownLoader.37195
Win32/Malagent Microsoft Trojan.DownLoader.37138
Win32/Malagent Microsoft Trojan.DownLoader.50562
Win32/Malagent Microsoft Trojan.DownLoader.37066
Win32/Malagent Microsoft Trojan.DownLoader.37281
Win32/Malagent Microsoft Trojan.DownLoader.37059
Win32/Malagent Microsoft Trojan.DownLoader.37259
Win32/Malagent Microsoft Trojan.DownLoader.36926
Win32/Malagent Microsoft Trojan.DownLoader.37108
Win32/Malagent Microsoft Trojan.DownLoader.37239
Win32/Malagent Microsoft Trojan.DownLoader.37191
Win32/Malagent Microsoft Trojan.DownLoader.37214
Win32/Malagent Microsoft Trojan.DownLoader.50650
Win32/Malagent Microsoft Trojan.DownLoader.37251
Win32/Malagent Microsoft Trojan.DownLoader.37169
Win32/Malagent Microsoft Trojan.Click.4841
Win32/Malagent Microsoft Trojan.DownLoader.37254
Win32/Malagent Microsoft Trojan.DownLoader.37062
Win32/Malagent Microsoft Trojan.DownLoader.37057
Win32/Malagent Microsoft Trojan.DownLoader.37158
Win32/Malagent Microsoft Trojan.DownLoader.37140
Win32/Malagent Microsoft Trojan.DownLoader.37101
Win32/Malagent Microsoft Trojan.DownLoader.37154
Win32/Malagent Microsoft Trojan.DownLoader.37120
Win32/Malagent Microsoft Trojan.DownLoader.37041

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.