Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Poisonivy.E aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.BlackHole.3178
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.Poison.1021
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Love
Backdoor:Win32/Poisonivy.E Microsoft Trojan.KeyLogger.2331
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.Poison.40
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.26894
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.14115
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.4545
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.Poison
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.17711
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.31368
Backdoor:Win32/Poisonivy.E Microsoft Win32.HLLM.Netsky.18353
Backdoor:Win32/Poisonivy.E Microsoft Exploit.DCom.197
Backdoor:Win32/Poisonivy.E Microsoft Trojan.PWS.LDPinch.3420
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Inject.3632
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.10270
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.12276
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Packed.496
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Packed.519
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Packed.568
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.15079
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.Poison.1
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.15367
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Packed.518
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.50818
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.51188
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.4039
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.35885
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.50961
Backdoor:Win32/Poisonivy.E Microsoft Trojan.KeyLogger.1833
Backdoor:Win32/Poisonivy.E Microsoft Trojan.NtRootKit.115
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.56757
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.59319
Backdoor:Win32/Poisonivy.E Microsoft Win32.HLLW.Autoruner.1540
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.51009
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoad.20
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.59589
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Kidsfun
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.46203
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.Shell.90
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoad.13577
Backdoor:Win32/Poisonivy.E Microsoft Trojan.Click.18664
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.Symfly.37
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.63572
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.7032
Backdoor:Win32/Poisonivy.E Microsoft Trojan.DownLoader.54878
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.4111
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.9508
Backdoor:Win32/Poisonivy.E Microsoft Trojan.MulDrop.15597
Backdoor:Win32/Poisonivy.E Microsoft BackDoor.IRC.Sdbot.3860

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.