FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Prorat aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.2220
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.37
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.32
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.19
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.252
Backdoor:Win32/Prorat Microsoft BackDoor.DarkMoon.138
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.152
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.48
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.44
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat
Backdoor:Win32/Prorat Microsoft Tool.ShowPass
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.18
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.16
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.14
Backdoor:Win32/Prorat Microsoft Win32.HLLW.MyBot.90
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.6150
Backdoor:Win32/Prorat Microsoft Trojan.ProAgent.20
Backdoor:Win32/Prorat Microsoft Win32.HLLW.MyBot.95
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.2764
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.6158
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.3885
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.11223
Backdoor:Win32/Prorat Microsoft BackDoor.Shell
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.11016
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.21
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.239
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.22
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.3391
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.2054
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.2990
Backdoor:Win32/Prorat Microsoft Trojan.DownLoader.4044
Backdoor:Win32/Prorat Microsoft Trojan.DownLoader.1281
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.46
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.197
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.818
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.14080
Backdoor:Win32/Prorat Microsoft Trojan.DownLoader.17840
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.8897
Backdoor:Win32/Prorat Microsoft Win32.HLLW.MyBot
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.129
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.104
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.123
Backdoor:Win32/Prorat Microsoft Trojan.DownLoader.8402
Backdoor:Win32/Prorat Microsoft Trojan.KeyLogger.212
Backdoor:Win32/Prorat Microsoft Trojan.DownLoader.10819
Backdoor:Win32/Prorat Microsoft Trojan.MulDrop.2065
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.108
Backdoor:Win32/Prorat Microsoft BackDoor.Generic.1020
Backdoor:Win32/Prorat Microsoft BackDoor.ProRat.28

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies