Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic Dropper.ay aliases:

Name Vendor Dr.Web classification name
Generic Dropper.ay McAfee Trojan.PWS.MSNSpy
Generic Dropper.ay McAfee Trojan.MulDrop.28517
Generic Dropper.ay McAfee Trojan.Inject.902
Generic Dropper.ay McAfee Trojan.DownLoad.186
Generic Dropper.ay McAfee Trojan.MulDrop.7982
Generic Dropper.ay McAfee Trojan.MulDrop.13277
Generic Dropper.ay McAfee Trojan.DownLoader.47765
Generic Dropper.ay McAfee Trojan.MulDrop.7367
Generic Dropper.ay McAfee Trojan.MulDrop.12468
Generic Dropper.ay McAfee Trojan.Inject.2019
Generic Dropper.ay McAfee Trojan.MulDrop.11104
Generic Dropper.ay McAfee Trojan.MulDrop.11419
Generic Dropper.ay McAfee Trojan.MulDrop.13442
Generic Dropper.ay McAfee Trojan.MulDrop.11172
Generic Dropper.ay McAfee Trojan.PWS.Lineage.4469
Generic Dropper.ay McAfee Trojan.MulDrop.9004
Generic Dropper.ay McAfee Trojan.MulDrop.11191
Generic Dropper.ay McAfee Trojan.Inject.4636
Generic Dropper.ay McAfee Trojan.Inject.2722
Generic Dropper.ay McAfee Trojan.MulDrop.16619
Generic Dropper.ay McAfee Trojan.DownLoader.63051
Generic Dropper.ay McAfee Trojan.Inject.947
Generic Dropper.ay McAfee Trojan.MulDrop.7413
Generic Dropper.ay McAfee Trojan.MulDrop.7891
Generic Dropper.ay McAfee Trojan.MulDrop.7876
Generic Dropper.ay McAfee Trojan.Inject.500
Generic Dropper.ay McAfee Trojan.DownLoader.48975
Generic Dropper.ay McAfee Trojan.DownLoader.62364
Generic Dropper.ay McAfee Trojan.MulDrop.6946
Generic Dropper.ay McAfee Trojan.Packed.511
Generic Dropper.ay McAfee Trojan.Siggen.63558
Generic Dropper.ay McAfee Trojan.PWS.Banker.origin
Generic Dropper.ay McAfee BackDoor.Shark.177

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.