FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-AVW.dr aliases:

Name Vendor Dr.Web classification name
BackDoor-AVW.dr McAfee Trojan.MulDrop.2318
BackDoor-AVW.dr McAfee Trojan.MulDrop.2811
BackDoor-AVW.dr McAfee Trojan.SCKeyLog.20
BackDoor-AVW.dr McAfee Trojan.MulDrop.1666
BackDoor-AVW.dr McAfee BackDoor.SubSeven.215
BackDoor-AVW.dr McAfee BackDoor.ProRat
BackDoor-AVW.dr McAfee Trojan.PWS.LDPinch.462
BackDoor-AVW.dr McAfee Trojan.MulDrop.2065
BackDoor-AVW.dr McAfee Trojan.MulDrop.2646
BackDoor-AVW.dr McAfee Trojan.MulDrop.2926
BackDoor-AVW.dr McAfee Trojan.PWS.LDPinch.459
BackDoor-AVW.dr McAfee Trojan.MulDrop.2764
BackDoor-AVW.dr McAfee Trojan.MulDrop.2054
BackDoor-AVW.dr McAfee Trojan.MulDrop.2220
BackDoor-AVW.dr McAfee Trojan.MulDrop.2177
BackDoor-AVW.dr McAfee Trojan.DownLoader.1127
BackDoor-AVW.dr McAfee Trojan.DownLoader.1280
BackDoor-AVW.dr McAfee BackDoor.Agent
BackDoor-AVW.dr McAfee Trojan.MulDrop.818
BackDoor-AVW.dr McAfee VBS.Siggen.6478
BackDoor-AVW.dr McAfee VBS.Siggen.7205
BackDoor-AVW.dr McAfee VBS.Siggen.3176
BackDoor-AVW.dr McAfee VBS.Siggen.7201
BackDoor-AVW.dr McAfee VBS.Siggen.1138
BackDoor-AVW.dr McAfee VBS.Siggen.1019
BackDoor-AVW.dr McAfee VBS.Siggen.7209
BackDoor-AVW.dr McAfee VBS.Siggen.4743
BackDoor-AVW.dr McAfee VBS.Siggen.7208
BackDoor-AVW.dr McAfee VBS.Siggen.7071
BackDoor-AVW.dr McAfee Trojan.DownLoader.10293
BackDoor-AVW.dr McAfee Trojan.MulDrop.6719
BackDoor-AVW.dr McAfee Trojan.MulDrop
BackDoor-AVW.dr McAfee Trojan.MulDrop.2641
BackDoor-AVW.dr McAfee Trojan.MulDrop.3863
BackDoor-AVW.dr McAfee BackDoor.Pinched
BackDoor-AVW.dr McAfee Trojan.MulDrop.2974
BackDoor-AVW.dr McAfee Trojan.MulDrop.5557
BackDoor-AVW.dr McAfee VBS.Siggen.4325
BackDoor-AVW.dr McAfee VBS.Siggen.4929
BackDoor-AVW.dr McAfee VBS.Siggen.515
BackDoor-AVW.dr McAfee VBS.Siggen.7215
BackDoor-AVW.dr McAfee Trojan.MulDrop.2765
BackDoor-AVW.dr McAfee Trojan.MulDrop.3997
BackDoor-AVW.dr McAfee VBS.Siggen.2464
BackDoor-AVW.dr McAfee VBS.Siggen.2979
BackDoor-AVW.dr McAfee VBS.Siggen.1699
BackDoor-AVW.dr McAfee VBS.Siggen.3188
BackDoor-AVW.dr McAfee Trojan.DownLoader.10378
BackDoor-AVW.dr McAfee Trojan.DownLoader.10377

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies