FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Program.ProcessLogger
Win32/Malagent Microsoft Trojan.DownLoader.51763
Win32/Malagent Microsoft Trojan.DownLoader.50797
Win32/Malagent Microsoft Trojan.DownLoader.51728
Win32/Malagent Microsoft Trojan.PWS.Banker.12818
Win32/Malagent Microsoft Trojan.DownLoader.55284
Win32/Malagent Microsoft Trojan.PWS.Sands
Win32/Malagent Microsoft Trojan.StartPage.1755
Win32/Malagent Microsoft Trojan.StealthDown
Win32/Malagent Microsoft Trojan.DownLoader.51764
Win32/Malagent Microsoft Trojan.Ilink
Win32/Malagent Microsoft Trojan.KeyLogger.491
Win32/Malagent Microsoft Trojan.Jet
Win32/Malagent Microsoft Trojan.KeyGen
Win32/Malagent Microsoft BackDoor.Klj
Win32/Malagent Microsoft Trojan.PWS.Yagolo
Win32/Malagent Microsoft Trojan.Loper.14
Win32/Malagent Microsoft Trojan.DownLoader.121
Win32/Malagent Microsoft Trojan.Click.16384
Win32/Malagent Microsoft Trojan.Bros
Win32/Malagent Microsoft Trojan.KeyLogger.426
Win32/Malagent Microsoft Trojan.PWS.Banker.776
Win32/Malagent Microsoft Trojan.MulDrop.3034
Win32/Malagent Microsoft Trojan.Proxy.552
Win32/Malagent Microsoft Trojan.MulDrop.3007
Win32/Malagent Microsoft Trojan.MulDrop.7419
Win32/Malagent Microsoft Trojan.DownLoader.7724
Win32/Malagent Microsoft Trojan.DownLoader.7188
Win32/Malagent Microsoft Trojan.DownLoader.7189
Win32/Malagent Microsoft Trojan.PWS.Banker.479
Win32/Malagent Microsoft Trojan.DownLoader.51747
Win32/Malagent Microsoft Trojan.DownLoader.49412
Win32/Malagent Microsoft Trojan.MulDrop.8011
Win32/Malagent Microsoft Trojan.DownLoader.14717
Win32/Malagent Microsoft Trojan.DownLoader.15159
Win32/Malagent Microsoft Trojan.DownLoader.15342
Win32/Malagent Microsoft Trojan.PWS.Lineage.3486
Win32/Malagent Microsoft Trojan.PWS.Poison
Win32/Malagent Microsoft BackDoor.Pigeon.82
Win32/Malagent Microsoft Win32.HLLW.Bashbot
Win32/Malagent Microsoft Trojan.Proxy.454
Win32/Malagent Microsoft Trojan.PWS.Javier
Win32/Malagent Microsoft Trojan.DownLoader.15180
Win32/Malagent Microsoft Trojan.Proxy.377
Win32/Malagent Microsoft Trojan.DownLoader.58262
Win32/Malagent Microsoft Trojan.DownLoader.58284
Win32/Malagent Microsoft Trojan.StartPage.882
Win32/Malagent Microsoft Trojan.StartPage.70
Win32/Malagent Microsoft Trojan.Swizzor.1460
Win32/Malagent Microsoft Trojan.DownLoader.57402

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

Dr.Web © Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies