Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Bifrose.gen!A aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.65
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.93
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Flux.101
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.11817
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.4116
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.56
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.DownLoader.62905
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.3130
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.636
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.74
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.106
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.6666
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.9434
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.DownLoader.31238
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.DownLoader.31241
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.8847
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.9126
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.479
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.38
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.DownLoader.42351
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.PWS.LDPinch.2856
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.48
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.10848
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.DarkMoon.138
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.11
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.51
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.4297
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.54
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.25
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.28
Backdoor:Win32/Bifrose.gen!A Microsoft Adware.Yassist
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.44
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.11700
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.634
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.10633
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.9813
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.4529
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.11193
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.4111
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.2990
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.619
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.83
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.618
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Bifrost.24
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.Packed.158
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.2764
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.3949
Backdoor:Win32/Bifrose.gen!A Microsoft Trojan.MulDrop.12716
Backdoor:Win32/Bifrose.gen!A Microsoft BackDoor.Pigeon

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.