Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-CEP!hv.c aliases:

Name Vendor Dr.Web classification name
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.917
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.515
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost
BackDoor-CEP!hv.c McAfee BackDoor.Pigeon.6620
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.834
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.753
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.740
BackDoor-CEP!hv.c McAfee BackDoor.IRC.Sdbot.909
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.906
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15756
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15811
BackDoor-CEP!hv.c McAfee Win32.HLLW.MyBot
BackDoor-CEP!hv.c McAfee Trojan.Siggen.3820
BackDoor-CEP!hv.c McAfee Trojan.PWS.Spy.3828
BackDoor-CEP!hv.c McAfee Trojan.Packed.143
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.133
BackDoor-CEP!hv.c McAfee Trojan.Packed.152
BackDoor-CEP!hv.c McAfee Win32.HLLW.MyBot.4483
BackDoor-CEP!hv.c McAfee BackDoor.ProRat.411
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.2327
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.873
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.874
BackDoor-CEP!hv.c McAfee Trojan.Siggen.61975
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.779
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.16310
BackDoor-CEP!hv.c McAfee Trojan.Siggen1.6480
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.14142
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15277
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15167
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.14866
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.14313
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15486
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.14635
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.14789
BackDoor-CEP!hv.c McAfee Trojan.Packed.650
BackDoor-CEP!hv.c McAfee Trojan.KeyLogger.3280
BackDoor-CEP!hv.c McAfee Win32.HLLW.MyBot.4337
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15304
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.14660
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15065
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15353
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15219
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15153
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.15471
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.14740
BackDoor-CEP!hv.c McAfee Trojan.MulDrop1.3990
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.16149
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.16159
BackDoor-CEP!hv.c McAfee Win32.HLLW.Autoruner.17006
BackDoor-CEP!hv.c McAfee BackDoor.Bifrost.8298

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.