Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.Z aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.265
BKDR_Generic.Z Trend Micro Trojan.Popuper
BKDR_Generic.Z Trend Micro BackDoor.Moons
BKDR_Generic.Z Trend Micro Trojan.Click.1403
BKDR_Generic.Z Trend Micro BackDoor.Flux.101
BKDR_Generic.Z Trend Micro BackDoor.Iroffer.1324
BKDR_Generic.Z Trend Micro BackDoor.Chimera
BKDR_Generic.Z Trend Micro BackDoor.Xconf.27
BKDR_Generic.Z Trend Micro BackDoor.EggDrop.17
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.780
BKDR_Generic.Z Trend Micro BackDoor.IRC.Sdbot
BKDR_Generic.Z Trend Micro BackDoor.Turban
BKDR_Generic.Z Trend Micro BackDoor.Cia.27
BKDR_Generic.Z Trend Micro BackDoor.Provedor
BKDR_Generic.Z Trend Micro Win32.IRC.Bot.based
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.610
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.1609
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.918
BKDR_Generic.Z Trend Micro Win32.HLLW.MyBot.based
BKDR_Generic.Z Trend Micro Trojan.PWS.LDPinch.1494
BKDR_Generic.Z Trend Micro BackDoor.Nethief.124
BKDR_Generic.Z Trend Micro Trojan.MulDrop.2220
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.1604
BKDR_Generic.Z Trend Micro BackDoor.PSClient
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.433
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.199
BKDR_Generic.Z Trend Micro BackDoor.CmjSpy.82
BKDR_Generic.Z Trend Micro Trojan.Proxy.1789
BKDR_Generic.Z Trend Micro Trojan.DownLoader.10946
BKDR_Generic.Z Trend Micro Win32.HLLW.Agobot
BKDR_Generic.Z Trend Micro BackDoor.Singu
BKDR_Generic.Z Trend Micro BackDoor.Biorante
BKDR_Generic.Z Trend Micro Agobot.Generator
BKDR_Generic.Z Trend Micro BackDoor.DarkMoon.68
BKDR_Generic.Z Trend Micro BackDoor.Xdoor.354
BKDR_Generic.Z Trend Micro BackDoor.Bifrost.10
BKDR_Generic.Z Trend Micro BackDoor.Pigeon.2428
BKDR_Generic.Z Trend Micro Adware.Stud
BKDR_Generic.Z Trend Micro BackDoor.Bifrost
BKDR_Generic.Z Trend Micro Trojan.Inject.333
BKDR_Generic.Z Trend Micro Trojan.MulDrop.7671
BKDR_Generic.Z Trend Micro BackDoor.R3C.153
BKDR_Generic.Z Trend Micro BackDoor.Beast
BKDR_Generic.Z Trend Micro Trojan.PWS.QQSender
BKDR_Generic.Z Trend Micro BackDoor.HackDef.387
BKDR_Generic.Z Trend Micro BackDoor.Srvlite
BKDR_Generic.Z Trend Micro BackDoor.IRC.Skan
BKDR_Generic.Z Trend Micro Win32.HLLW.Nodir
BKDR_Generic.Z Trend Micro Trojan.MulDrop.7716
BKDR_Generic.Z Trend Micro BackDoor.IRC.Ali

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.