Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic.B aliases:

Name Vendor Dr.Web classification name
Generic.b McAfee Trojan.ZmWorm.36864
Generic.b McAfee Trojan.Ultimate.15
Generic.b McAfee Trojan.MulDrop.319
Generic.b McAfee Trojan.Sockify
Generic.b McAfee Trojan.Vipack
Generic.b McAfee Trojan.Hooka
Generic.b McAfee Trojan.DownLoader.283
Generic.b McAfee Trojan.DownLoader.266
Generic.b McAfee Trojan.DownLoader.268
Generic.b McAfee BackDoor.Exception
Generic.b McAfee Trojan.Memento
Generic.b McAfee Trojan.MulDrop.704
Generic.b McAfee Trojan.Yurvish
Generic.b McAfee Trojan.Altfor
Generic.b McAfee Trojan.Ncwrapper
Generic.b McAfee Trojan.Das.10
Generic.b McAfee BackDoor.Thunker
Generic.b McAfee BackDoor.Generic.665
Generic.b McAfee Trojan.PWS.Fakemsn
Generic.b McAfee Trojan.KeyLogger.36864
Generic.b McAfee BackDoor.Generic.812
Generic.b McAfee Nuke.Vai
Generic.b McAfee Trojan.Klog.32786
Generic.b McAfee Trojan.CLogger
Generic.b McAfee Trojan.Seokil
Generic.b McAfee Trojan.Renat
Generic.b McAfee Trojan.PWS.Cave
Generic.b McAfee Trojan.Uzbet
Generic.b McAfee FDOS.Winping
Generic.b McAfee Nuke.DFM.10381
Generic.b McAfee Trojan.Colonel
Generic.b McAfee Trojan.AutoDown
Generic.b McAfee Trojan.Ripper
Generic.b McAfee FDOS.VTG.201
Generic.b McAfee Trojan.MulDrop.1247
Generic.b McAfee BackDoor.Remoper
Generic.b McAfee BackDoor.Phoenix.190
Generic.b McAfee BackDoor.Nightmare
Generic.b McAfee Win32.HLLW.Merlin
Generic.b McAfee BackDoor.Jacktron
Generic.b McAfee BackDoor.EasyServ.11
Generic.b McAfee BackDoor.DarkSky.23
Generic.b McAfee BackDoor.Cafeini.8
Generic.b McAfee BackDoor.Cafeini.9
Generic.b McAfee BackDoor.Ipword
Generic.b McAfee BackDoor.Phoenix.144
Generic.b McAfee BackDoor.Phoenix.146
Generic.b McAfee BackDoor.Phoenix.128
Generic.b McAfee BackDoor.BOrifice.112
Generic.b McAfee BackDoor.BO2k

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.