Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic Dropper.dq aliases:

Name Vendor Dr.Web classification name
Generic Dropper.dq McAfee Trojan.DownLoad.5202
Generic Dropper.dq McAfee Trojan.MulDrop.18940
Generic Dropper.dq McAfee BackDoor.IRC.Sdbot.4478
Generic Dropper.dq McAfee Trojan.MulDrop.18844
Generic Dropper.dq McAfee BackDoor.Poison.472
Generic Dropper.dq McAfee BackDoor.IRC.Bot.239
Generic Dropper.dq McAfee Trojan.Packed.418
Generic Dropper.dq McAfee Trojan.DownLoad.39524
Generic Dropper.dq McAfee Trojan.MulDrop1.4903
Generic Dropper.dq McAfee Trojan.PWS.Multi.38
Generic Dropper.dq McAfee BackDoor.Poison.767
Generic Dropper.dq McAfee BackDoor.Poison.40
Generic Dropper.dq McAfee BackDoor.BotSiggen.37
Generic Dropper.dq McAfee Trojan.MulDrop1.4877
Generic Dropper.dq McAfee BackDoor.IRC.Sdbot.4700
Generic Dropper.dq McAfee Trojan.Siggen.4729
Generic Dropper.dq McAfee Trojan.Siggen.4709
Generic Dropper.dq McAfee Trojan.MulDrop1.4892
Generic Dropper.dq McAfee Trojan.LydraSpy.1392
Generic Dropper.dq McAfee Trojan.Proxy.origin
Generic Dropper.dq McAfee Trojan.MulDrop1.4880
Generic Dropper.dq McAfee Trojan.Siggen.4775
Generic Dropper.dq McAfee BackDoor.IRC.Bot.240
Generic Dropper.dq McAfee BackDoor.Poison.1162
Generic Dropper.dq McAfee Trojan.MulDrop.36270
Generic Dropper.dq McAfee Trojan.Siggen.11891
Generic Dropper.dq McAfee BackDoor.Dosia.72
Generic Dropper.dq McAfee Trojan.Siggen.11660
Generic Dropper.dq McAfee Trojan.Siggen.12571
Generic Dropper.dq McAfee Trojan.Siggen.7405
Generic Dropper.dq McAfee Trojan.Siggen.7523
Generic Dropper.dq McAfee Trojan.Siggen.17949
Generic Dropper.dq McAfee BackDoor.Poison.1407

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.