Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.PWS.Qqpass.1552
Win32/Malagent Microsoft Trojan.DownLoader.51684
Win32/Malagent Microsoft Trojan.DownLoader.51518
Win32/Malagent Microsoft Trojan.DownLoader.51680
Win32/Malagent Microsoft Trojan.DownLoader.56622
Win32/Malagent Microsoft BackDoor.Pigeon.8290
Win32/Malagent Microsoft Trojan.DownLoader.36456
Win32/Malagent Microsoft Trojan.DownLoader.13262
Win32/Malagent Microsoft Trojan.KeyLogger.637
Win32/Malagent Microsoft Trojan.PWS.Bancos.231
Win32/Malagent Microsoft Trojan.Proxy.747
Win32/Malagent Microsoft Program.ServUServer.60
Win32/Malagent Microsoft Trojan.MulDrop.12645
Win32/Malagent Microsoft BackDoor.Fox.20
Win32/Malagent Microsoft Trojan.DownLoader.51186
Win32/Malagent Microsoft Win32.HLLM.Graz
Win32/Malagent Microsoft BackDoor.Generic.1485
Win32/Malagent Microsoft BackDoor.Kurban
Win32/Malagent Microsoft BackDoor.Pigeon.8544
Win32/Malagent Microsoft BackDoor.IRC.Realbot
Win32/Malagent Microsoft Trojan.DownLoader.54486
Win32/Malagent Microsoft Trojan.DownLoader.44985
Win32/Malagent Microsoft Trojan.DownLoader.57543
Win32/Malagent Microsoft Trojan.DownLoader.35761
Win32/Malagent Microsoft Trojan.DownLoader.57659
Win32/Malagent Microsoft Trojan.DownLoader.15548
Win32/Malagent Microsoft Trojan.DownLoader.54614
Win32/Malagent Microsoft Trojan.DownLoader.54469
Win32/Malagent Microsoft Win32.HLLW.Ppcod
Win32/Malagent Microsoft Win32.HLLW.Generic.206
Win32/Malagent Microsoft Trojan.DownLoader.13830
Win32/Malagent Microsoft Trojan.DownLoader.13781
Win32/Malagent Microsoft Trojan.DownLoader.13847
Win32/Malagent Microsoft Trojan.DownLoader.13870
Win32/Malagent Microsoft Trojan.DownLoader.13689
Win32/Malagent Microsoft Trojan.DownLoader.36373
Win32/Malagent Microsoft Trojan.DownLoader.48996
Win32/Malagent Microsoft Trojan.DownLoader.57696
Win32/Malagent Microsoft Trojan.DownLoader.50912
Win32/Malagent Microsoft Trojan.DownLoader.55246
Win32/Malagent Microsoft Trojan.MulDrop.6241
Win32/Malagent Microsoft Trojan.MulDrop.6916
Win32/Malagent Microsoft Trojan.MulDrop.7048
Win32/Malagent Microsoft Trojan.MulDrop.7368
Win32/Malagent Microsoft Trojan.PWS.Cip
Win32/Malagent Microsoft Trojan.Proxy.625
Win32/Malagent Microsoft Trojan.Proxy.2630
Win32/Malagent Microsoft Trojan.Proxy.2628
Win32/Malagent Microsoft Trojan.DownLoader.56982
Win32/Malagent Microsoft Trojan.DownLoader.46687

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.