Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Heur.Invader aliases:

Name Vendor Dr.Web classification name
Heur.Invader Kaspersky BackDoor.Maper
Heur.Invader Kaspersky Trojan.Inject.59
Heur.Invader Kaspersky Trojan.MulDrop.16713
Heur.Invader Kaspersky Trojan.DownLoader.25801
Heur.Invader Kaspersky Trojan.DownLoader.29794
Heur.Invader Kaspersky Trojan.DownLoader.52622
Heur.Invader Kaspersky Trojan.DownLoader.20646
Heur.Invader Kaspersky Trojan.DownLoader.14014
Heur.Invader Kaspersky Trojan.DownLoader.14013
Heur.Invader Kaspersky Trojan.PWS.Micro
Heur.Invader Kaspersky Trojan.Click.2216
Heur.Invader Kaspersky Trojan.PWS.Gamania.origin
Heur.Invader Kaspersky Trojan.DownLoader.3692
Heur.Invader Kaspersky Trojan.DownLoader.42426
Heur.Invader Kaspersky Trojan.DownLoader.44506
Heur.Invader Kaspersky Trojan.DownLoader.8558
Heur.Invader Kaspersky Trojan.PWS.GoldSpy
Heur.Invader Kaspersky BackDoor.IRC.Sdbot.2747
Heur.Invader Kaspersky Trojan.Winlock
Heur.Invader Kaspersky Trojan.MulDrop.18132
Heur.Invader Kaspersky Win32.HLLW.Autoruner.533
Heur.Invader Kaspersky Trojan.DownLoader.31093
Heur.Invader Kaspersky Trojan.DownLoader.33696
Heur.Invader Kaspersky Trojan.DownLoader.55478
Heur.Invader Kaspersky Trojan.DownLoader.18424
Heur.Invader Kaspersky Trojan.DownLoader.30986
Heur.Invader Kaspersky Trojan.DownLoader.9060
Heur.Invader Kaspersky Trojan.DownLoader.28291
Heur.Invader Kaspersky Trojan.DownLoader.37232
Heur.Invader Kaspersky Trojan.DownLoader.37172
Heur.Invader Kaspersky Trojan.DownLoader.57172
Heur.Invader Kaspersky BackDoor.Pigeon.8059
Heur.Invader Kaspersky Trojan.DownLoader.18248
Heur.Invader Kaspersky Trojan.DownLoader.36835
Heur.Invader Kaspersky BackDoor.Poison
Heur.Invader Kaspersky Trojan.DownLoader.30624
Heur.Invader Kaspersky BackDoor.AFX.53
Heur.Invader Kaspersky Trojan.DownLoader.54261
Heur.Invader Kaspersky Trojan.StartPage.21405
Heur.Invader Kaspersky Trojan.DownLoader.54560
Heur.Invader Kaspersky Trojan.DownLoader.46448
Heur.Invader Kaspersky Trojan.Inject.3690
Heur.Invader Kaspersky Trojan.DownLoader.36606
Heur.Invader Kaspersky Trojan.DownLoader.36573
Heur.Invader Kaspersky Trojan.DownLoader.36786
Heur.Invader Kaspersky Trojan.DownLoader.32198
Heur.Invader Kaspersky Trojan.MulDrop.6222
Heur.Invader Kaspersky BackDoor.Cub
Heur.Invader Kaspersky Trojan.DownLoader.15881
Heur.Invader Kaspersky Trojan.DownLoader.46449

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.