Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.Click.753
Win32/Malagent Microsoft Trojan.MulDrop.14140
Win32/Malagent Microsoft Trojan.MulDrop.6530
Win32/Malagent Microsoft Trojan.NtRootKit.903
Win32/Malagent Microsoft Trojan.MulDrop.7167
Win32/Malagent Microsoft Trojan.PWS.Legmir.1024
Win32/Malagent Microsoft Trojan.DownLoader.57548
Win32/Malagent Microsoft Trojan.Proxy.3148
Win32/Malagent Microsoft Trojan.Proxy.1035
Win32/Malagent Microsoft Trojan.Codename
Win32/Malagent Microsoft Trojan.Proxy.316
Win32/Malagent Microsoft Trojan.StartPage.21021
Win32/Malagent Microsoft Trojan.PWS.Gamania.8129
Win32/Malagent Microsoft Trojan.DownLoader.57705
Win32/Malagent Microsoft Trojan.DownLoader.46710
Win32/Malagent Microsoft Trojan.DownLoader.57028
Win32/Malagent Microsoft Trojan.MulDrop.3284
Win32/Malagent Microsoft Trojan.PWS.Banker.12789
Win32/Malagent Microsoft BackDoor.IRC.Sdbot.2774
Win32/Malagent Microsoft BackDoor.Msgina
Win32/Malagent Microsoft Trojan.MulDrop.15890
Win32/Malagent Microsoft Trojan.PWS.Banker.21019
Win32/Malagent Microsoft Trojan.MulDrop.2990
Win32/Malagent Microsoft Trojan.MulDrop.14499
Win32/Malagent Microsoft Trojan.DownLoader.50788
Win32/Malagent Microsoft Trojan.DownLoader.51557
Win32/Malagent Microsoft Trojan.DownLoader.340
Win32/Malagent Microsoft Trojan.MulDrop.10859
Win32/Malagent Microsoft BackDoor.Pigeon.10834
Win32/Malagent Microsoft Trojan.DownLoader.19963
Win32/Malagent Microsoft Trojan.DownLoader.51498
Win32/Malagent Microsoft Trojan.DownLoader.50495
Win32/Malagent Microsoft Trojan.DownLoader.50496
Win32/Malagent Microsoft Trojan.DownLoader.51752
Win32/Malagent Microsoft BackDoor.DMoon.69
Win32/Malagent Microsoft Win32.HLLM.Nicky.3
Win32/Malagent Microsoft Trojan.PWS.Banker.598
Win32/Malagent Microsoft Trojan.Proxy.875
Win32/Malagent Microsoft Trojan.Proxy.808
Win32/Malagent Microsoft Trojan.StartPage.1160
Win32/Malagent Microsoft Trojan.DownLoader.51613
Win32/Malagent Microsoft Trojan.DownLoader.51608
Win32/Malagent Microsoft BackDoor.Beizhu.749
Win32/Malagent Microsoft BackDoor.Beizhu.865
Win32/Malagent Microsoft Trojan.Click.1362
Win32/Malagent Microsoft Trojan.Click.1356
Win32/Malagent Microsoft Trojan.Inject.1529
Win32/Malagent Microsoft Trojan.Inject.1547
Win32/Malagent Microsoft Trojan.Inject.1722
Win32/Malagent Microsoft Trojan.Inject.1561

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.