Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

MemScan:Backdoor.Bifrost.MD aliases:

Name Vendor Dr.Web classification name
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.691
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.740
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.906
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.867
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.859
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.985
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.902
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.984
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.896
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.939
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.922
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.926
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.943
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.949
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.941
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.972
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.815
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.849
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.855
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.846
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.15922
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.848
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.825
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.863
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.826
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.15002
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.15031
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.15142
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.15378
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.14832
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.14475
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.14821
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.15472
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.15425
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.16074
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.16188
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.7953
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.4147
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.3640
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.1528
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.8054
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.8526
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.9130
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.1603
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.965
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.7989
MemScan:Backdoor.Bifrost.MD BitDefender Win32.HLLW.Autoruner.8607
MemScan:Backdoor.Bifrost.MD BitDefender Trojan.Packed.650
MemScan:Backdoor.Bifrost.MD BitDefender BackDoor.Bifrost.3237

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.