Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.DownLoader.37104
Win32/Malagent Microsoft Trojan.DownLoader.37256
Win32/Malagent Microsoft Trojan.DownLoader.37078
Win32/Malagent Microsoft Trojan.DownLoader.37286
Win32/Malagent Microsoft Trojan.DownLoader.37246
Win32/Malagent Microsoft Trojan.DownLoader.37112
Win32/Malagent Microsoft Trojan.DownLoader.37231
Win32/Malagent Microsoft Trojan.DownLoader.37261
Win32/Malagent Microsoft Trojan.Click.4867
Win32/Malagent Microsoft Trojan.DownLoader.37080
Win32/Malagent Microsoft Trojan.DownLoader.28958
Win32/Malagent Microsoft Trojan.DownLoader.37133
Win32/Malagent Microsoft Trojan.DownLoader.37278
Win32/Malagent Microsoft Trojan.DownLoader.37143
Win32/Malagent Microsoft Trojan.DownLoader.37037
Win32/Malagent Microsoft Trojan.DownLoader.12257
Win32/Malagent Microsoft Trojan.DownLoader.50991
Win32/Malagent Microsoft Trojan.DownLoader.51204
Win32/Malagent Microsoft Trojan.DownLoader.56972
Win32/Malagent Microsoft Trojan.DownLoader.36438
Win32/Malagent Microsoft Trojan.DownLoader.57115
Win32/Malagent Microsoft Trojan.StartPage.20695
Win32/Malagent Microsoft Trojan.StartPage.20689
Win32/Malagent Microsoft Trojan.Spambot.2693
Win32/Malagent Microsoft Trojan.StartPage.20671
Win32/Malagent Microsoft Trojan.Ugly.29377
Win32/Malagent Microsoft Trojan.StartPage.20665
Win32/Malagent Microsoft Trojan.Tspop
Win32/Malagent Microsoft Trojan.NtRootKit.956
Win32/Malagent Microsoft Trojan.Touch
Win32/Malagent Microsoft Trojan.Spybi
Win32/Malagent Microsoft Trojan.Flashy
Win32/Malagent Microsoft Trojan.Dummy
Win32/Malagent Microsoft Trojan.Fakealert.362
Win32/Malagent Microsoft Trojan.House
Win32/Malagent Microsoft Trojan.PWS.Legmir.885
Win32/Malagent Microsoft Trojan.PWS.Legmir.1229
Win32/Malagent Microsoft Trojan.PWS.Legmir.1507
Win32/Malagent Microsoft Trojan.PWS.Gamania.10007
Win32/Malagent Microsoft Trojan.PWS.Legmir.985
Win32/Malagent Microsoft Trojan.PWS.Gamania.10005
Win32/Malagent Microsoft Trojan.PWS.Qqpass.1816
Win32/Malagent Microsoft Trojan.PWS.Civure
Win32/Malagent Microsoft Trojan.PWS.Legmir.342
Win32/Malagent Microsoft Trojan.PWS.Legmir.1509
Win32/Malagent Microsoft Trojan.PWS.Legmir.1418
Win32/Malagent Microsoft Trojan.PWS.Gamania.7714
Win32/Malagent Microsoft Trojan.Packed.140
Win32/Malagent Microsoft Trojan.Swizzor.based
Win32/Malagent Microsoft Trojan.PWS.Banker.9725

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.