Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Poison aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Poison Microsoft Trojan.Inject.549
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.16439
Backdoor:Win32/Poison Microsoft BackDoor.Poison
Backdoor:Win32/Poison Microsoft Trojan.DownLoader.12354
Backdoor:Win32/Poison Microsoft Trojan.KeyLogger.603
Backdoor:Win32/Poison Microsoft BackDoor.IRC.Sdbot.909
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.15970
Backdoor:Win32/Poison Microsoft Trojan.StartPage.1646
Backdoor:Win32/Poison Microsoft Trojan.DownLoad.44
Backdoor:Win32/Poison Microsoft Trojan.DownLoader.21855
Backdoor:Win32/Poison Microsoft BackDoor.Pigeon.82
Backdoor:Win32/Poison Microsoft BackDoor.IRC.Sdbot.2787
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.5850
Backdoor:Win32/Poison Microsoft Trojan.Inject.240
Backdoor:Win32/Poison Microsoft BackDoor.Pigeon.2102
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.8851
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.9087
Backdoor:Win32/Poison Microsoft BackDoor.Iroffer.1421
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.9654
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.19363
Backdoor:Win32/Poison Microsoft BackDoor.Iroffer.1275
Backdoor:Win32/Poison Microsoft BackDoor.IRC.Sdbot.2269
Backdoor:Win32/Poison Microsoft Program.PoisonIvy
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.21037
Backdoor:Win32/Poison Microsoft BackDoor.Bifrost
Backdoor:Win32/Poison Microsoft BackDoor.Huai.1560
Backdoor:Win32/Poison Microsoft Trojan.DownLoader.16941
Backdoor:Win32/Poison Microsoft Trojan.DownLoader.26876
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.15890
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.818
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.10659
Backdoor:Win32/Poison Microsoft BackDoor.Pigeon.10789
Backdoor:Win32/Poison Microsoft BackDoor.Apex.78
Backdoor:Win32/Poison Microsoft BackDoor.Pigeon.21851
Backdoor:Win32/Poison Microsoft Trojan.DownLoader.50991
Backdoor:Win32/Poison Microsoft BackDoor.Poison.474
Backdoor:Win32/Poison Microsoft Trojan.Packed.650
Backdoor:Win32/Poison Microsoft BackDoor.Pigeon.17504
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.6028
Backdoor:Win32/Poison Microsoft Trojan.MulDrop.10856
Backdoor:Win32/Poison Microsoft Trojan.Siggen.59894
Backdoor:Win32/Poison Microsoft Trojan.DownLoader.10622
Backdoor:Win32/Poison Microsoft Trojan.Peflog.1101
Backdoor:Win32/Poison Microsoft Trojan.Siggen.56071
Backdoor:Win32/Poison Microsoft Trojan.Siggen.56882
Backdoor:Win32/Poison Microsoft Trojan.Siggen.59587
Backdoor:Win32/Poison Microsoft Trojan.Siggen.61485
Backdoor:Win32/Poison Microsoft Trojan.Siggen.57537
Backdoor:Win32/Poison Microsoft Trojan.Siggen.62441
Backdoor:Win32/Poison Microsoft Trojan.Siggen.59479

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.