Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Malagent aliases:

Name Vendor Dr.Web classification name
Win32/Malagent Microsoft Trojan.DownLoader.46809
Win32/Malagent Microsoft Trojan.DownLoader.646
Win32/Malagent Microsoft Trojan.DownLoader.8892
Win32/Malagent Microsoft Trojan.DownLoader.46422
Win32/Malagent Microsoft Trojan.DownLoader.3370
Win32/Malagent Microsoft Win32.HLLW.Autoruner.958
Win32/Malagent Microsoft Trojan.DownLoader.5308
Win32/Malagent Microsoft Trojan.DownLoader.51510
Win32/Malagent Microsoft Trojan.DownLoader.53072
Win32/Malagent Microsoft Trojan.Inject.1500
Win32/Malagent Microsoft BackDoor.Pigeon.8732
Win32/Malagent Microsoft BackDoor.Generic.1647
Win32/Malagent Microsoft BackDoor.Nethief.142
Win32/Malagent Microsoft BackDoor.Pigeon.3882
Win32/Malagent Microsoft BackDoor.Pigeon.3884
Win32/Malagent Microsoft Trojan.DownLoader.51704
Win32/Malagent Microsoft Trojan.DownLoader.26753
Win32/Malagent Microsoft Trojan.Click.4231
Win32/Malagent Microsoft Trojan.Click.117
Win32/Malagent Microsoft Trojan.Click.4232
Win32/Malagent Microsoft Trojan.Click.4329
Win32/Malagent Microsoft Trojan.Click.17608
Win32/Malagent Microsoft Trojan.Click.3472
Win32/Malagent Microsoft Trojan.Click.17788
Win32/Malagent Microsoft Trojan.DownLoader.44554
Win32/Malagent Microsoft Trojan.PWS.Signon
Win32/Malagent Microsoft Trojan.DownLoader.44811
Win32/Malagent Microsoft Trojan.DownLoader.44553
Win32/Malagent Microsoft Trojan.DownLoader.43104
Win32/Malagent Microsoft Trojan.DownLoader.23883
Win32/Malagent Microsoft Trojan.DownLoader.17671
Win32/Malagent Microsoft Trojan.DownLoader.55228
Win32/Malagent Microsoft BackDoor.Pigeon.11064
Win32/Malagent Microsoft Trojan.PWS.Banker.12731
Win32/Malagent Microsoft Trojan.Sender.30
Win32/Malagent Microsoft Win32.HLLW.Autoruner.1800
Win32/Malagent Microsoft Win32.HLLW.Autoruner.1806
Win32/Malagent Microsoft Win32.HLLW.Autoruner.1411
Win32/Malagent Microsoft Trojan.DownLoader.51657
Win32/Malagent Microsoft Trojan.DownLoader.33813
Win32/Malagent Microsoft Trojan.DownLoader.51665
Win32/Malagent Microsoft Trojan.DownLoader.51554
Win32/Malagent Microsoft Trojan.MulDrop.6271
Win32/Malagent Microsoft Trojan.MulDrop.6412
Win32/Malagent Microsoft BackDoor.Pigeon.5037
Win32/Malagent Microsoft Trojan.MulDrop.13693
Win32/Malagent Microsoft Trojan.MulDrop.6020
Win32/Malagent Microsoft Trojan.MulDrop.14602
Win32/Malagent Microsoft Trojan.DownLoader.663
Win32/Malagent Microsoft BackDoor.Hay

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.