Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.DownLoader.59787
Win32/Malagent Microsoft Trojan.DownLoader.60066
Win32/Malagent Microsoft Adware.QQHelp.655
Win32/Malagent Microsoft Trojan.PWS.Lineage.4587
Win32/Malagent Microsoft Trojan.PWS.Lineage.4553
Win32/Malagent Microsoft BackDoor.Pigeon.4371
Win32/Malagent Microsoft Trojan.Swizzor.1791
Win32/Malagent Microsoft Trojan.DownLoader.39264
Win32/Malagent Microsoft Trojan.DownLoader.43116
Win32/Malagent Microsoft Trojan.Swizzor.1392
Win32/Malagent Microsoft Trojan.Swizzor.1461
Win32/Malagent Microsoft Trojan.Swizzor.1456
Win32/Malagent Microsoft Trojan.Swizzor.1467
Win32/Malagent Microsoft Trojan.Swizzor.1213
Win32/Malagent Microsoft Trojan.DownLoader.50798
Win32/Malagent Microsoft Trojan.DownLoader.51628
Win32/Malagent Microsoft Trojan.DownLoader.51762
Win32/Malagent Microsoft Trojan.DownLoader.51687
Win32/Malagent Microsoft Trojan.DownLoader.50790
Win32/Malagent Microsoft Trojan.Click.17598
Win32/Malagent Microsoft Trojan.MulDrop.13968
Win32/Malagent Microsoft Trojan.PWS.Banker.21008
Win32/Malagent Microsoft Flooder.Itaq
Win32/Malagent Microsoft Trojan.CDJoke.18437
Win32/Malagent Microsoft Trojan.Click.17862
Win32/Malagent Microsoft BackDoor.IRC.Gold
Win32/Malagent Microsoft BackDoor.IRC.Bot.33
Win32/Malagent Microsoft Trojan.Ill.3796
Win32/Malagent Microsoft Program.ProcessLogger
Win32/Malagent Microsoft Trojan.PWS.Banker.12818
Win32/Malagent Microsoft Trojan.Jet
Win32/Malagent Microsoft Trojan.PWS.Yagolo
Win32/Malagent Microsoft Trojan.DownLoader.121
Win32/Malagent Microsoft Trojan.MulDrop.3007
Win32/Malagent Microsoft Trojan.Proxy.552
Win32/Malagent Microsoft Trojan.DownLoader.7724
Win32/Malagent Microsoft Trojan.DownLoader.51747
Win32/Malagent Microsoft Trojan.PWS.Lineage.3486
Win32/Malagent Microsoft BackDoor.Pigeon.82
Win32/Malagent Microsoft Trojan.StartPage.882
Win32/Malagent Microsoft Trojan.DownLoader.15180
Win32/Malagent Microsoft Trojan.DownLoader.58262
Win32/Malagent Microsoft Trojan.StartPage.70
Win32/Malagent Microsoft Trojan.Swizzor.3687
Win32/Malagent Microsoft Trojan.Swizzor.3675
Win32/Malagent Microsoft Trojan.Swizzor.3692
Win32/Malagent Microsoft Trojan.Swizzor.3749
Win32/Malagent Microsoft Trojan.Swizzor.3677
Win32/Malagent Microsoft Trojan.Swizzor.3723
Win32/Malagent Microsoft Trojan.Swizzor.3697

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.