Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Dldr.Agent.YZD aliases:

Name Vendor Dr.Web classification name
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.35885
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.51188
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.30260
TR/Dldr.Agent.YZD Avira Exploit.DCom.197
TR/Dldr.Agent.YZD Avira BackDoor.Poison
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.1859
TR/Dldr.Agent.YZD Avira BackDoor.Poison.40
TR/Dldr.Agent.YZD Avira Trojan.Inject.362
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.5822
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.51467
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.11541
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.58295
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.7372
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.17161
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.26894
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.3954
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.2159
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.13727
TR/Dldr.Agent.YZD Avira Exploit.DCom.196
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.12998
TR/Dldr.Agent.YZD Avira BackDoor.Poison.2
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.50818
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.5980
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.51187
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.10976
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.17658
TR/Dldr.Agent.YZD Avira Trojan.Inject.339
TR/Dldr.Agent.YZD Avira Trojan.Hooker.21073
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.6417
TR/Dldr.Agent.YZD Avira BackDoor.Poison.64
TR/Dldr.Agent.YZD Avira BackDoor.Poison.1021
TR/Dldr.Agent.YZD Avira BackDoor.Poison.147
TR/Dldr.Agent.YZD Avira BackDoor.Poison.170
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.3130
TR/Dldr.Agent.YZD Avira BackDoor.Poison.685
TR/Dldr.Agent.YZD Avira Trojan.PWS.LDPinch.3420
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.21020
TR/Dldr.Agent.YZD Avira BackDoor.Poison.61
TR/Dldr.Agent.YZD Avira BackDoor.Poison.686
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.51070
TR/Dldr.Agent.YZD Avira BackDoor.Pigeon.17504
TR/Dldr.Agent.YZD Avira Trojan.DownLoader.46203
TR/Dldr.Agent.YZD Avira Trojan.DownLoader1.1400
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.16480
TR/Dldr.Agent.YZD Avira Trojan.KeyLogger.2331
TR/Dldr.Agent.YZD Avira BackDoor.Poison.870
TR/Dldr.Agent.YZD Avira Trojan.DownLoad1.37526
TR/Dldr.Agent.YZD Avira Trojan.MulDrop.33839
TR/Dldr.Agent.YZD Avira Trojan.DownLoader1.131
TR/Dldr.Agent.YZD Avira BackDoor.Poison.767

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.