FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.Click.59
Win32/Malagent Microsoft Trojan.Click.176
Win32/Malagent Microsoft Trojan.Dluca.56861
Win32/Malagent Microsoft BackDoor.IrcContact.37
Win32/Malagent Microsoft Trojan.Click.18639
Win32/Malagent Microsoft Trojan.Click.17326
Win32/Malagent Microsoft Trojan.Click.1987
Win32/Malagent Microsoft Trojan.Click.4740
Win32/Malagent Microsoft Trojan.Click.1666
Win32/Malagent Microsoft Trojan.Click.253
Win32/Malagent Microsoft Trojan.Click.875
Win32/Malagent Microsoft Trojan.Click.17444
Win32/Malagent Microsoft Trojan.Click.980
Win32/Malagent Microsoft Trojan.Proxy.108
Win32/Malagent Microsoft Trojan.Click.1023
Win32/Malagent Microsoft Trojan.Genie
Win32/Malagent Microsoft Trojan.Click.3126
Win32/Malagent Microsoft Trojan.Click.321
Win32/Malagent Microsoft Trojan.Click.1721
Win32/Malagent Microsoft Trojan.Isbar.397
Win32/Malagent Microsoft Trojan.Click.3618
Win32/Malagent Microsoft Trojan.Dluca.56862
Win32/Malagent Microsoft Trojan.Luzya
Win32/Malagent Microsoft Trojan.Click.17525
Win32/Malagent Microsoft Trojan.DownLoader.48885
Win32/Malagent Microsoft Trojan.Click.948
Win32/Malagent Microsoft Trojan.Click.4852
Win32/Malagent Microsoft BackDoor.IRC.Bot.49
Win32/Malagent Microsoft Trojan.DownLoader.47442
Win32/Malagent Microsoft Trojan.DownLoader.46210
Win32/Malagent Microsoft Trojan.Click.16809
Win32/Malagent Microsoft Trojan.DownLoader.49103
Win32/Malagent Microsoft Trojan.DownLoader.49004
Win32/Malagent Microsoft Trojan.Click.4322
Win32/Malagent Microsoft Trojan.Click.18773
Win32/Malagent Microsoft Trojan.DownLoader.47419
Win32/Malagent Microsoft Trojan.DownLoader.48988
Win32/Malagent Microsoft BackDoor.IRC.Drone.2
Win32/Malagent Microsoft Trojan.PWS.Banker.583
Win32/Malagent Microsoft Trojan.PWS.Luzia
Win32/Malagent Microsoft Trojan.PWS.Fulbiz
Win32/Malagent Microsoft Trojan.DownLoader.51740
Win32/Malagent Microsoft Trojan.PWS.Radegast
Win32/Malagent Microsoft Trojan.DownLoader.47850
Win32/Malagent Microsoft Trojan.DownLoader.51779
Win32/Malagent Microsoft Trojan.Proxy.280
Win32/Malagent Microsoft Trojan.MulDrop.1986
Win32/Malagent Microsoft Trojan.DownLoader.51629
Win32/Malagent Microsoft Trojan.PWS.Banker.467
Win32/Malagent Microsoft Trojan.DownLoader.32604

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies