Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.1859
BKDR_Generic Trend Micro Win32.IRC.Bot.86
BKDR_Generic Trend Micro BackDoor.Pigeon.23342
BKDR_Generic Trend Micro BackDoor.Pigeon.23317
BKDR_Generic Trend Micro BackDoor.Pigeon.23360
BKDR_Generic Trend Micro BackDoor.Pigeon.23340
BKDR_Generic Trend Micro Trojan.Inject.902
BKDR_Generic Trend Micro Trojan.PWS.Banker.12840
BKDR_Generic Trend Micro BackDoor.YAT.100
BKDR_Generic Trend Micro Tool.ProcessKill.10
BKDR_Generic Trend Micro Trojan.DownLoader.52248
BKDR_Generic Trend Micro Trojan.Click.1748
BKDR_Generic Trend Micro Trojan.DownLoader.50684
BKDR_Generic Trend Micro Trojan.DownLoader.51285
BKDR_Generic Trend Micro Trojan.KeyLogger.88
BKDR_Generic Trend Micro BackDoor.Poison.812
BKDR_Generic Trend Micro BackDoor.Pigeon.9856
BKDR_Generic Trend Micro BackDoor.Pigeon.12920
BKDR_Generic Trend Micro BackDoor.Pigeon.3897
BKDR_Generic Trend Micro BackDoor.Pigeon.6173
BKDR_Generic Trend Micro BackDoor.Pigeon.9668
BKDR_Generic Trend Micro BackDoor.Susftp
BKDR_Generic Trend Micro BackDoor.Pigeon.6811
BKDR_Generic Trend Micro BackDoor.Pigeon.6643
BKDR_Generic Trend Micro BackDoor.BlackHole.2159
BKDR_Generic Trend Micro BackDoor.Pigeon.11464
BKDR_Generic Trend Micro BackDoor.Pigeon.14397
BKDR_Generic Trend Micro BackDoor.Pigeon.1829
BKDR_Generic Trend Micro BackDoor.Generic.968
BKDR_Generic Trend Micro BackDoor.Pigeon.4924
BKDR_Generic Trend Micro BackDoor.Pigeon.6792
BKDR_Generic Trend Micro Trojan.StartPage.21146
BKDR_Generic Trend Micro Trojan.PWS.Banker.11634
BKDR_Generic Trend Micro BackDoor.EggDrop.1621
BKDR_Generic Trend Micro BackDoor.Generic.1166
BKDR_Generic Trend Micro BackDoor.Generic.357
BKDR_Generic Trend Micro BackDoor.Graybird.2036
BKDR_Generic Trend Micro BackDoor.Beizhu.1366
BKDR_Generic Trend Micro BackDoor.Generic.883
BKDR_Generic Trend Micro BackDoor.Generic.1376
BKDR_Generic Trend Micro Trojan.DownLoader.48978
BKDR_Generic Trend Micro BackDoor.Theef.210
BKDR_Generic Trend Micro BackDoor.Infol
BKDR_Generic Trend Micro BackDoor.NtRootKit.40
BKDR_Generic Trend Micro BackDoor.Mattack
BKDR_Generic Trend Micro BackDoor.Attack.21
BKDR_Generic Trend Micro BackDoor.IRC.Shabot
BKDR_Generic Trend Micro BackDoor.Huai.531
BKDR_Generic Trend Micro BackDoor.IcqKnock.9
BKDR_Generic Trend Micro Trojan.MulDrop.7392

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.