FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.PWS.Misc
Win32/Malagent Microsoft Trojan.PWS.Banker.1471
Win32/Malagent Microsoft Trojan.PWS.MailSnd
Win32/Malagent Microsoft Trojan.DownLoader.4398
Win32/Malagent Microsoft Trojan.DownLoader.4399
Win32/Malagent Microsoft Dialer.Sexfiles
Win32/Malagent Microsoft Trojan.DownLoader.4170
Win32/Malagent Microsoft Trojan.DownLoader.4373
Win32/Malagent Microsoft Trojan.Click.690
Win32/Malagent Microsoft Trojan.DownLoader.4289
Win32/Malagent Microsoft Trojan.PWS.Banker.14648
Win32/Malagent Microsoft Trojan.PWS.Banker.11911
Win32/Malagent Microsoft Trojan.Proxy.253
Win32/Malagent Microsoft Trojan.PWS.Banker.11160
Win32/Malagent Microsoft Trojan.Click.278
Win32/Malagent Microsoft Dialer.Accessor
Win32/Malagent Microsoft Trojan.Proxy.425
Win32/Malagent Microsoft Dialer.Little
Win32/Malagent Microsoft Dialer.Sgirls
Win32/Malagent Microsoft Trojan.PWS.Banker.19611
Win32/Malagent Microsoft Trojan.PWS.Lineage
Win32/Malagent Microsoft Trojan.PWS.Banker.19366
Win32/Malagent Microsoft BackDoor.IRC.Sdbot.3159
Win32/Malagent Microsoft BackDoor.IRC.Sdbot.2819
Win32/Malagent Microsoft BackDoor.IRC.Sdbot.2574
Win32/Malagent Microsoft Trojan.ProAgent.12
Win32/Malagent Microsoft Trojan.Proxy.2045
Win32/Malagent Microsoft Trojan.Proxy.2102
Win32/Malagent Microsoft Trojan.PWS.Banker.11477
Win32/Malagent Microsoft Trojan.Proxy.2070
Win32/Malagent Microsoft Trojan.Proxy.2046
Win32/Malagent Microsoft Trojan.Proxy.2088
Win32/Malagent Microsoft Trojan.PWS.Banbra
Win32/Malagent Microsoft Trojan.PWS.Bancos.277
Win32/Malagent Microsoft Trojan.MulDrop.8473
Win32/Malagent Microsoft Trojan.Packed.153
Win32/Malagent Microsoft Trojan.StartPage.20015
Win32/Malagent Microsoft BackDoor.BlackHole.2196
Win32/Malagent Microsoft BackDoor.Sepultura
Win32/Malagent Microsoft Trojan.StartPage.20805
Win32/Malagent Microsoft BackDoor.BlackHole.2197
Win32/Malagent Microsoft BackDoor.Havar
Win32/Malagent Microsoft BackDoor.Haxur
Win32/Malagent Microsoft BackDoor.DarkMoon.120
Win32/Malagent Microsoft BackDoor.Rejoice
Win32/Malagent Microsoft BackDoor.Beizhu.747
Win32/Malagent Microsoft BackDoor.Before
Win32/Malagent Microsoft BackDoor.Sensode
Win32/Malagent Microsoft BackDoor.Mithril
Win32/Malagent Microsoft BackDoor.Callisto

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies