Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Small aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Small Microsoft Trojan.PWS.Gamania.5744
Backdoor:Win32/Small Microsoft Trojan.Inject.3477
Backdoor:Win32/Small Microsoft BackDoor.Scard
Backdoor:Win32/Small Microsoft BackDoor.Pwnz
Backdoor:Win32/Small Microsoft Trojan.PWS.Gamania.10991
Backdoor:Win32/Small Microsoft Trojan.PWS.Gamania.10447
Backdoor:Win32/Small Microsoft Program.RemoteAdmin.36
Backdoor:Win32/Small Microsoft BackDoor.Kiddy
Backdoor:Win32/Small Microsoft BackDoor.RShell
Backdoor:Win32/Small Microsoft BackDoor.Rana.8
Backdoor:Win32/Small Microsoft BackDoor.Insti.130
Backdoor:Win32/Small Microsoft BackDoor.Soul
Backdoor:Win32/Small Microsoft BackDoor.Feed
Backdoor:Win32/Small Microsoft BackDoor.Pice
Backdoor:Win32/Small Microsoft BackDoor.Chaos
Backdoor:Win32/Small Microsoft Trojan.DownLoader.6007
Backdoor:Win32/Small Microsoft Trojan.KeyLogger.668
Backdoor:Win32/Small Microsoft Trojan.Lenovo.7
Backdoor:Win32/Small Microsoft BackDoor.Polax
Backdoor:Win32/Small Microsoft Win32.HLLW.Dedler.61444
Backdoor:Win32/Small Microsoft BackDoor.Matrix
Backdoor:Win32/Small Microsoft BackDoor.Icqboss
Backdoor:Win32/Small Microsoft BackDoor.Dcmbot
Backdoor:Win32/Small Microsoft Trojan.Click.3437
Backdoor:Win32/Small Microsoft BackDoor.Tiny.10
Backdoor:Win32/Small Microsoft BackDoor.Gament
Backdoor:Win32/Small Microsoft BackDoor.Chax
Backdoor:Win32/Small Microsoft BackDoor.Sync
Backdoor:Win32/Small Microsoft BackDoor.Gnaarly
Backdoor:Win32/Small Microsoft BackDoor.Ghirai
Backdoor:Win32/Small Microsoft Trojan.DownLoader.38094
Backdoor:Win32/Small Microsoft Trojan.DownLoader.28502
Backdoor:Win32/Small Microsoft BackDoor.Dumaru
Backdoor:Win32/Small Microsoft BackDoor.Lena
Backdoor:Win32/Small Microsoft Trojan.Packed.158
Backdoor:Win32/Small Microsoft Trojan.DownLoader.62860
Backdoor:Win32/Small Microsoft Trojan.DownLoader.63795
Backdoor:Win32/Small Microsoft BackDoor.Tinyshell
Backdoor:Win32/Small Microsoft BackDoor.Doebyt
Backdoor:Win32/Small Microsoft BackDoor.Firdem
Backdoor:Win32/Small Microsoft Trojan.DownLoader.47073
Backdoor:Win32/Small Microsoft Trojan.DownLoader.45428
Backdoor:Win32/Small Microsoft BackDoor.Aim.31
Backdoor:Win32/Small Microsoft Trojan.Click.1831
Backdoor:Win32/Small Microsoft BackDoor.Kegrat
Backdoor:Win32/Small Microsoft BackDoor.Roam
Backdoor:Win32/Small Microsoft BackDoor.Winsta
Backdoor:Win32/Small Microsoft BackDoor.Ack
Backdoor:Win32/Small Microsoft Trojan.DownLoader.46800
Backdoor:Win32/Small Microsoft Trojan.PWS.Gamania.2631

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.