Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic.b aliases:

Name Vendor Dr.Web classification name
Generic.b McAfee BackDoor.IRC.Jtram
Generic.b McAfee BackDoor.ProRat.10
Generic.b McAfee Trojan.Konsocks
Generic.b McAfee Trojan.Infospy
Generic.b McAfee Trojan.PWS.Mamipas.5632
Generic.b McAfee Trojan.PWS.RedZone.41
Generic.b McAfee Trojan.PWS.Qover
Generic.b McAfee Trojan.PWS.Delarm
Generic.b McAfee Trojan.Tider
Generic.b McAfee Trojan.Stedir.11
Generic.b McAfee Nuke.Igmp.20
Generic.b McAfee Trojan.FakeDll
Generic.b McAfee Trojan.MulDrop.304
Generic.b McAfee Trojan.Cipher
Generic.b McAfee Trojan.Margo
Generic.b McAfee Trojan.Shark
Generic.b McAfee BackDoor.Connect.10
Generic.b McAfee Trojan.Chernich
Generic.b McAfee Trojan.Clipan
Generic.b McAfee Trojan.Click.595
Generic.b McAfee BackDoor.HackTack
Generic.b McAfee Trojan.Akuan
Generic.b McAfee BackDoor.SpeedHack
Generic.b McAfee BackDoor.Bio.11
Generic.b McAfee BackDoor.GF.13
Generic.b McAfee Trojan.Proxy.27
Generic.b McAfee BackDoor.Pazus.141
Generic.b McAfee Trojan.WMSteel
Generic.b McAfee BackDoor.Danton.414
Generic.b McAfee BackDoor.Asylum.12
Generic.b McAfee BackDoor.Fc.10
Generic.b McAfee BackDoor.Dagger.131
Generic.b McAfee Trojan.PWS.Wmsender
Generic.b McAfee Trojan.Wmbug.101
Generic.b McAfee Trojan.Spon
Generic.b McAfee Trojan.Fearless
Generic.b McAfee BackDoor.Rdesk.11
Generic.b McAfee BackDoor.IRC.Sdbot.281
Generic.b McAfee BackDoor.Thunkiss
Generic.b McAfee BackDoor.SBD.20
Generic.b McAfee BackDoor.Rewind.14
Generic.b McAfee BackDoor.Revenger.150
Generic.b McAfee BackDoor.Reload.39
Generic.b McAfee Win32.HLLW.Generic.31
Generic.b McAfee Trojan.KeyLogger.24
Generic.b McAfee BackDoor.PBrit
Generic.b McAfee BackDoor.Optix.131
Generic.b McAfee Win32.Opasoft.27136
Generic.b McAfee Trojan.MyDoomer
Generic.b McAfee Trojan.MulDrop.636

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.