Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Poisonivy.H aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Packed.596
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.686
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.710
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.198
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.699
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Inject.5405
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.46203
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.51284
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoad.9302
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoad.26727
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoad.9418
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Keylog.93
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.206
Backdoor:Win32/Poisonivy.H Microsoft Trojan.KeyLogger.2331
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.61
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.PcClient.638
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.47354
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.413
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.420
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.40
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.50
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.DarkMoon.143
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.685
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.409
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.773
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.767
Backdoor:Win32/Poisonivy.H Microsoft Trojan.MulDrop.31212
Backdoor:Win32/Poisonivy.H Microsoft Trojan.MulDrop.31206
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.744
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.1
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.56884
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Inject.3029
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Inject.3264
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Inject.3329
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Inject.3333
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.26894
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.50818
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.54367
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.49429
Backdoor:Win32/Poisonivy.H Microsoft Trojan.MulDrop.16453
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.55
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Inject.3632
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.64
Backdoor:Win32/Poisonivy.H Microsoft Trojan.Siggen.2252
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.208
Backdoor:Win32/Poisonivy.H Microsoft BackDoor.Poison.347
Backdoor:Win32/Poisonivy.H Microsoft Exploit.DCom.196
Backdoor:Win32/Poisonivy.H Microsoft Exploit.DCom.197
Backdoor:Win32/Poisonivy.H Microsoft Trojan.DownLoader.12792

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.