Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.ProRat.30
BKDR_Generic Trend Micro BackDoor.Thud
BKDR_Generic Trend Micro BackDoor.Sin.23
BKDR_Generic Trend Micro BackDoor.Nuclear.24
BKDR_Generic Trend Micro BackDoor.WinShell.51
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.1859
BKDR_Generic Trend Micro BackDoor.Pigeon.23317
BKDR_Generic Trend Micro BackDoor.Pigeon.23360
BKDR_Generic Trend Micro Tool.ProcessKill.10
BKDR_Generic Trend Micro Trojan.Click.1748
BKDR_Generic Trend Micro BackDoor.Pigeon.12920
BKDR_Generic Trend Micro BackDoor.Pigeon.14397
BKDR_Generic Trend Micro BackDoor.Pigeon.1829
BKDR_Generic Trend Micro BackDoor.Generic.968
BKDR_Generic Trend Micro BackDoor.Pigeon.4924
BKDR_Generic Trend Micro BackDoor.Pigeon.6792
BKDR_Generic Trend Micro Trojan.StartPage.21146
BKDR_Generic Trend Micro Trojan.PWS.Banker.11634
BKDR_Generic Trend Micro BackDoor.EggDrop.1621
BKDR_Generic Trend Micro BackDoor.Generic.1166
BKDR_Generic Trend Micro BackDoor.Generic.357
BKDR_Generic Trend Micro BackDoor.Graybird.2036
BKDR_Generic Trend Micro BackDoor.Beizhu.1366
BKDR_Generic Trend Micro BackDoor.Generic.883
BKDR_Generic Trend Micro Trojan.MulDrop.7392
BKDR_Generic Trend Micro BackDoor.Phantom.21
BKDR_Generic Trend Micro BackDoor.Huai.1153
BKDR_Generic Trend Micro BackDoor.Moons
BKDR_Generic Trend Micro BackDoor.Pigeon.7218
BKDR_Generic Trend Micro BackDoor.Pigeon.6974
BKDR_Generic Trend Micro BackDoor.Prodex.132
BKDR_Generic Trend Micro BackDoor.Bifrost.831
BKDR_Generic Trend Micro BackDoor.Danton.42
BKDR_Generic Trend Micro BackDoor.BDeath
BKDR_Generic Trend Micro BackDoor.Attack.22
BKDR_Generic Trend Micro Trojan.DownLoader.56662
BKDR_Generic Trend Micro BackDoor.Generic.478
BKDR_Generic Trend Micro BackDoor.Generic.1276
BKDR_Generic Trend Micro BackDoor.Beizhu.719
BKDR_Generic Trend Micro BackDoor.Retbit
BKDR_Generic Trend Micro BackDoor.Beizhu.1203
BKDR_Generic Trend Micro BackDoor.RC
BKDR_Generic Trend Micro Trojan.MulDrop.27760
BKDR_Generic Trend Micro BackDoor.IRC.Evil
BKDR_Generic Trend Micro Trojan.Click.27892
BKDR_Generic Trend Micro BackDoor.Pigeon.8794
BKDR_Generic Trend Micro BackDoor.Pigeon.13247
BKDR_Generic Trend Micro Trojan.MulDrop.14166
BKDR_Generic Trend Micro BackDoor.Beizhu.1142
BKDR_Generic Trend Micro Trojan.KeyLogger.181

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.