Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Trojan.Inject
BKDR_Generic Trend Micro Trojan.Inject.3347
BKDR_Generic Trend Micro Trojan.Wlog
BKDR_Generic Trend Micro BackDoor.Elfrit.12
BKDR_Generic Trend Micro Trojan.DownLoader.55032
BKDR_Generic Trend Micro BackDoor.Pigeon.9695
BKDR_Generic Trend Micro BackDoor.Freesize
BKDR_Generic Trend Micro Win32.HLLW.Jane
BKDR_Generic Trend Micro Trojan.DownLoader.49856
BKDR_Generic Trend Micro BackDoor.IRC.Rxbot
BKDR_Generic Trend Micro BackDoor.Darkshell.18
BKDR_Generic Trend Micro BackDoor.Xploit
BKDR_Generic Trend Micro BackDoor.Wildek.1
BKDR_Generic Trend Micro BackDoor.Haxdoor.333
BKDR_Generic Trend Micro BackDoor.Yuri
BKDR_Generic Trend Micro Trojan.KeyLogger.2060
BKDR_Generic Trend Micro Trojan.KeyLogger.1852
BKDR_Generic Trend Micro BackDoor.IRC.Dosig
BKDR_Generic Trend Micro Trojan.KeyLogger.2046
BKDR_Generic Trend Micro BackDoor.Devil.30
BKDR_Generic Trend Micro Trojan.KeyLogger.1833
BKDR_Generic Trend Micro Trojan.MulDrop.2083
BKDR_Generic Trend Micro Trojan.MulDrop.7153
BKDR_Generic Trend Micro BackDoor.Hong
BKDR_Generic Trend Micro BackDoor.Rejoice.582
BKDR_Generic Trend Micro BackDoor.Huai.5453
BKDR_Generic Trend Micro Trojan.MulDrop.7420
BKDR_Generic Trend Micro Trojan.MulDrop.4658
BKDR_Generic Trend Micro Trojan.DownLoader.14777
BKDR_Generic Trend Micro Trojan.DownLoader.34106
BKDR_Generic Trend Micro Trojan.DownLoader.35292
BKDR_Generic Trend Micro Trojan.MulDrop.9966
BKDR_Generic Trend Micro Trojan.MulDrop.3879
BKDR_Generic Trend Micro Trojan.MulDrop.13007
BKDR_Generic Trend Micro Trojan.MulDrop.12575
BKDR_Generic Trend Micro Trojan.MulDrop.13334
BKDR_Generic Trend Micro Trojan.MulDrop.11197
BKDR_Generic Trend Micro Trojan.DownLoader.59005
BKDR_Generic Trend Micro BackDoor.Bifrost.929
BKDR_Generic Trend Micro BackDoor.Bifrost.902
BKDR_Generic Trend Micro Trojan.MulDrop.2659
BKDR_Generic Trend Micro BackDoor.Pigeon.398
BKDR_Generic Trend Micro BackDoor.Pigeon.9912
BKDR_Generic Trend Micro BackDoor.Pigeon.7419
BKDR_Generic Trend Micro BackDoor.Wefed
BKDR_Generic Trend Micro BackDoor.Afcore
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.927
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2870
BKDR_Generic Trend Micro BackDoor.ProRat.23
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.456

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.