Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic BackDoor.t aliases:

Name Vendor Dr.Web classification name
Generic BackDoor.t McAfee Exploit.CAN2003.533
Generic BackDoor.t McAfee BackDoor.Thunk
Generic BackDoor.t McAfee BackDoor.Furq
Generic BackDoor.t McAfee BackDoor.Magic
Generic BackDoor.t McAfee BackDoor.MCYo
Generic BackDoor.t McAfee Trojan.PWS.TprocMon
Generic BackDoor.t McAfee Adware.Cdn
Generic BackDoor.t McAfee Trojan.KeyLogger.3521
Generic BackDoor.t McAfee Trojan.MulDrop.2639
Generic BackDoor.t McAfee Trojan.DownLoader.4052
Generic BackDoor.t McAfee Trojan.KeyLogger.377
Generic BackDoor.t McAfee BackDoor.IeDown
Generic BackDoor.t McAfee Trojan.DownLoader.8797
Generic BackDoor.t McAfee BackDoor.Minirem
Generic BackDoor.t McAfee BackDoor.Inge
Generic BackDoor.t McAfee Trojan.PWS.Tibia
Generic BackDoor.t McAfee BackDoor.Insti.70
Generic BackDoor.t McAfee Trojan.KillProc
Generic BackDoor.t McAfee Adware.Cacb
Generic BackDoor.t McAfee BackDoor.SevenEleven
Generic BackDoor.t McAfee Trojan.Urlex
Generic BackDoor.t McAfee Win32.HLLW.Mistri.25
Generic BackDoor.t McAfee Trojan.DownLoader.50486
Generic BackDoor.t McAfee BackDoor.Insti.46
Generic BackDoor.t McAfee BackDoor.Beizhu.274
Generic BackDoor.t McAfee Trojan.MulDrop.14973
Generic BackDoor.t McAfee Trojan.DownLoader.55933
Generic BackDoor.t McAfee Trojan.DownLoader.56559
Generic BackDoor.t McAfee BackDoor.Sabason
Generic BackDoor.t McAfee Trojan.DownLoader.50180
Generic BackDoor.t McAfee BackDoor.Meubot
Generic BackDoor.t McAfee BackDoor.Zxshell.5
Generic BackDoor.t McAfee BackDoor.Beizhu.449
Generic BackDoor.t McAfee Trojan.Click.4050
Generic BackDoor.t McAfee Trojan.DownLoader.56560
Generic BackDoor.t McAfee Trojan.PWS.Centaur
Generic BackDoor.t McAfee BackDoor.SevenEleven.50
Generic BackDoor.t McAfee BackDoor.Sabason.26
Generic BackDoor.t McAfee BackDoor.Zxshell
Generic BackDoor.t McAfee Trojan.DownLoad.3532
Generic BackDoor.t McAfee Trojan.MulDrop.12123
Generic BackDoor.t McAfee Trojan.Oasis
Generic BackDoor.t McAfee Trojan.RedSpy
Generic BackDoor.t McAfee BackDoor.Redgirl.6
Generic BackDoor.t McAfee BackDoor.Pigeon.4449
Generic BackDoor.t McAfee Trojan.MulDrop.13322
Generic BackDoor.t McAfee BackDoor.SevenEleven.51
Generic BackDoor.t McAfee DDoS.Rincux.160
Generic BackDoor.t McAfee Trojan.Hooker.21072
Generic BackDoor.t McAfee Trojan.DownLoader.23781

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.