Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Ciadoor.G aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Ciadoor.G Microsoft Program.Ardamax
Backdoor:Win32/Ciadoor.G Microsoft Tool.Netcat
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoad.1726
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Poison.40
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Iroffer.1235
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.12998
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.15589
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoader.1127
Backdoor:Win32/Ciadoor.G Microsoft Win32.HLLW.Stalker
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoad.44
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Shell
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.9434
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Darkave
Backdoor:Win32/Ciadoor.G Microsoft Trojan.Inject.549
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Bifrost.74
Backdoor:Win32/Ciadoor.G Microsoft Trojan.Elite.10
Backdoor:Win32/Ciadoor.G Microsoft Trojan.Elite.11
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoader.24862
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Bifrost
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.6197
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.16014
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.ProRat.16
Backdoor:Win32/Ciadoor.G Microsoft Adware.Zango
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.3636
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoader.56662
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Tmrbase.2
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.5013
Backdoor:Win32/Ciadoor.G Microsoft Program.Ardamax.170
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Poison.64
Backdoor:Win32/Ciadoor.G Microsoft Trojan.Inject.5089
Backdoor:Win32/Ciadoor.G Microsoft Trojan.Sinique.10
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.20128
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Yuri
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Dosia.72
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Mbot.50
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.BOrifice.11
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.ProRat
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Generic.776
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoader.12354
Backdoor:Win32/Ciadoor.G Microsoft Trojan.NtRootKit.40
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.360
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Generic.1141
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.10329
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Bifrost.637
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.Faggoty
Backdoor:Win32/Ciadoor.G Microsoft BackDoor.BotNet.49
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoader.36559
Backdoor:Win32/Ciadoor.G Microsoft Trojan.KeyLogger.603
Backdoor:Win32/Ciadoor.G Microsoft Trojan.MulDrop.310
Backdoor:Win32/Ciadoor.G Microsoft Trojan.DownLoad.42841

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.