Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-ASB aliases:

Name Vendor Dr.Web classification name
BackDoor-ASB McAfee BackDoor.SuperStar
BackDoor-ASB McAfee BackDoor.Generic.440
BackDoor-ASB McAfee BackDoor.Cliue
BackDoor-ASB McAfee BackDoor.Generic.417
BackDoor-ASB McAfee BackDoor.Generic.441
BackDoor-ASB McAfee BackDoor.Generic.454
BackDoor-ASB McAfee BackDoor.Cia.12
BackDoor-ASB McAfee BackDoor.Generic.684
BackDoor-ASB McAfee BackDoor.Generic.682
BackDoor-ASB McAfee BackDoor.Generic.706
BackDoor-ASB McAfee BackDoor.Cia.11
BackDoor-ASB McAfee BackDoor.Generic.585
BackDoor-ASB McAfee BackDoor.Generic.418
BackDoor-ASB McAfee BackDoor.Cia.10
BackDoor-ASB McAfee Adware.Winad
BackDoor-ASB McAfee Trojan.MulDrop.357
BackDoor-ASB McAfee BackDoor.Cia.123
BackDoor-ASB McAfee BackDoor.Cia.13
BackDoor-ASB McAfee BackDoor.IRC.Sdbot
BackDoor-ASB McAfee Win32.HLLW.Agobot
BackDoor-ASB McAfee BackDoor.Cia.19
BackDoor-ASB McAfee Trojan.DownLoader.4046
BackDoor-ASB McAfee Trojan.DownLoader.5178
BackDoor-ASB McAfee Trojan.KeyLogger.90
BackDoor-ASB McAfee Win32.IRC.Bot.based
BackDoor-ASB McAfee BackDoor.IRC.Sdbot.56
BackDoor-ASB McAfee Trojan.MulDrop.1127
BackDoor-ASB McAfee Trojan.KeyLogger.88
BackDoor-ASB McAfee Win32.HLLW.MyBot
BackDoor-ASB McAfee BackDoor.Cia
BackDoor-ASB McAfee BackDoor.Generic.592
BackDoor-ASB McAfee BackDoor.Cia.121
BackDoor-ASB McAfee BackDoor.Generic.586
BackDoor-ASB McAfee Trojan.KeyLogger.89
BackDoor-ASB McAfee Win32.HLLW.MyBot.based
BackDoor-ASB McAfee BackDoor.Generic.803
BackDoor-ASB McAfee BackDoor.Cia.20
BackDoor-ASB McAfee BackDoor.Generic.685
BackDoor-ASB McAfee BackDoor.Cia.24
BackDoor-ASB McAfee BackDoor.Cia.23
BackDoor-ASB McAfee Trojan.DownLoader.62486
BackDoor-ASB McAfee Trojan.PWS.Qqrobber.23
BackDoor-ASB McAfee Trojan.Packed.471
BackDoor-ASB McAfee Trojan.DownLoader.62487
BackDoor-ASB McAfee BackDoor.SubSeven.21
BackDoor-ASB McAfee BackDoor.SniperNet.23
BackDoor-ASB McAfee Trojan.NtRootKit.774
BackDoor-ASB McAfee BackDoor.IRC.Sniper
BackDoor-ASB McAfee BackDoor.Sniper
BackDoor-ASB McAfee Trojan.MulDrop.10608

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.