FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.Inject.3169
Win32/Malagent Microsoft Trojan.Inject.3200
Win32/Malagent Microsoft Trojan.Inject.3201
Win32/Malagent Microsoft Trojan.Inject.3197
Win32/Malagent Microsoft Trojan.Inject.570
Win32/Malagent Microsoft Trojan.Keylog.69
Win32/Malagent Microsoft Trojan.Keyspy
Win32/Malagent Microsoft Trojan.Hooker.21071
Win32/Malagent Microsoft Trojan.Inject.3220
Win32/Malagent Microsoft Trojan.Inject.3198
Win32/Malagent Microsoft Trojan.Inject.3226
Win32/Malagent Microsoft Trojan.Inject.573
Win32/Malagent Microsoft Trojan.Torrent
Win32/Malagent Microsoft Trojan.Inject.3213
Win32/Malagent Microsoft Trojan.Inject.3221
Win32/Malagent Microsoft Trojan.Inject.3207
Win32/Malagent Microsoft Trojan.Inject.3210
Win32/Malagent Microsoft Trojan.Inject.3177
Win32/Malagent Microsoft Trojan.Inject.3180
Win32/Malagent Microsoft Trojan.Inject.3182
Win32/Malagent Microsoft Trojan.Inject.3187
Win32/Malagent Microsoft Trojan.DownLoader.31852
Win32/Malagent Microsoft Trojan.DownLoader.50774
Win32/Malagent Microsoft Trojan.DownLoader.50769
Win32/Malagent Microsoft Trojan.DownLoader.55106
Win32/Malagent Microsoft Trojan.DownLoader.51654
Win32/Malagent Microsoft Trojan.DownLoader.52293
Win32/Malagent Microsoft Trojan.DownLoader.51516
Win32/Malagent Microsoft Trojan.DownLoader.51519
Win32/Malagent Microsoft Trojan.DownLoader.50770
Win32/Malagent Microsoft Trojan.DownLoader.52992
Win32/Malagent Microsoft Trojan.DownLoader.50754
Win32/Malagent Microsoft Trojan.Proxy.589
Win32/Malagent Microsoft BackDoor.Ddoser
Win32/Malagent Microsoft Trojan.Proxy.617
Win32/Malagent Microsoft Trojan.PWS.Winstor
Win32/Malagent Microsoft BackDoor.Generic.1325
Win32/Malagent Microsoft BackDoor.Gst.26
Win32/Malagent Microsoft BackDoor.Image
Win32/Malagent Microsoft BackDoor.Gage
Win32/Malagent Microsoft BackDoor.IRC.Rifle
Win32/Malagent Microsoft BackDoor.Insti.49
Win32/Malagent Microsoft BackDoor.Generic.1287
Win32/Malagent Microsoft Trojan.PWS.Gamania.4878
Win32/Malagent Microsoft Trojan.PWS.Qqpass.1668
Win32/Malagent Microsoft Trojan.DownLoader.50230
Win32/Malagent Microsoft Trojan.Inject.360
Win32/Malagent Microsoft Trojan.Inject.3299
Win32/Malagent Microsoft Trojan.Jiospy
Win32/Malagent Microsoft Trojan.Inject.3174

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies