Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic BackDoor.i aliases:

Name Vendor Dr.Web classification name
Generic BackDoor.i McAfee BackDoor.IRC.Mentez
Generic BackDoor.i McAfee BackDoor.Cht
Generic BackDoor.i McAfee BackDoor.IRC.Drix
Generic BackDoor.i McAfee BackDoor.IRC.Mazafaka
Generic BackDoor.i McAfee BackDoor.TScout.12
Generic BackDoor.i McAfee Trojan.DownLoader.3907
Generic BackDoor.i McAfee BackDoor.Teste
Generic BackDoor.i McAfee BackDoor.Rswap
Generic BackDoor.i McAfee BackDoor.Hermey
Generic BackDoor.i McAfee Trojan.Click.703
Generic BackDoor.i McAfee Trojan.Click.690
Generic BackDoor.i McAfee BackDoor.Nitrocam
Generic BackDoor.i McAfee Trojan.PWS.Higgy
Generic BackDoor.i McAfee Trojan.Copyself
Generic BackDoor.i McAfee Trojan.TencentAd
Generic BackDoor.i McAfee BackDoor.Dabass
Generic BackDoor.i McAfee BackDoor.Bavor
Generic BackDoor.i McAfee Trojan.PWS.Banker.5602
Generic BackDoor.i McAfee BackDoor.Wizarder
Generic BackDoor.i McAfee DDoS.Splinter
Generic BackDoor.i McAfee Win32.HLLM.Paps
Generic BackDoor.i McAfee BackDoor.IRC.Realbot
Generic BackDoor.i McAfee Trojan.PWS.Banker.3088
Generic BackDoor.i McAfee Trojan.PWS.Banker.9576
Generic BackDoor.i McAfee Trojan.PWS.Banker.6277
Generic BackDoor.i McAfee Trojan.DownLoader.32391
Generic BackDoor.i McAfee BackDoor.Furax
Generic BackDoor.i McAfee BackDoor.Dong
Generic BackDoor.i McAfee Trojan.WSLogger
Generic BackDoor.i McAfee Trojan.DownLoader.23317
Generic BackDoor.i McAfee Trojan.Proxy.441
Generic BackDoor.i McAfee Trojan.PWS.Banker.14534
Generic BackDoor.i McAfee Trojan.Click.2559
Generic BackDoor.i McAfee Trojan.Click.2521
Generic BackDoor.i McAfee Trojan.Click.2520
Generic BackDoor.i McAfee Trojan.Click.2540
Generic BackDoor.i McAfee Trojan.Click.2554
Generic BackDoor.i McAfee Trojan.Click.2512
Generic BackDoor.i McAfee BackDoor.Mutex
Generic BackDoor.i McAfee Trojan.DownLoader.54959
Generic BackDoor.i McAfee Trojan.Proxy.3753
Generic BackDoor.i McAfee Trojan.Inject.3479
Generic BackDoor.i McAfee BackDoor.Sabason

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.