Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic.f aliases:

Name Vendor Dr.Web classification name
Generic.f McAfee Trojan.DownLoader.3584
Generic.f McAfee BackDoor.Utilman.10
Generic.f McAfee Trojan.MSNSpy
Generic.f McAfee Trojan.Apesh
Generic.f McAfee Trojan.MulDrop.1553
Generic.f McAfee BackDoor.Insanor
Generic.f McAfee Trojan.StartPage.174
Generic.f McAfee Flooder.Bobo
Generic.f McAfee Tool.FireDaemon
Generic.f McAfee BackDoor.Ofsong
Generic.f McAfee Trojan.Paranote
Generic.f McAfee Trojan.DownLoader.548
Generic.f McAfee Trojan.Mesger
Generic.f McAfee BackDoor.Mesiha
Generic.f McAfee FDOS.Zmail
Generic.f McAfee BackDoor.Eraser
Generic.f McAfee BackDoor.Generic.430
Generic.f McAfee BackDoor.Judas
Generic.f McAfee BackDoor.Erazer.10
Generic.f McAfee Trojan.MulDrop.1111
Generic.f McAfee BackDoor.Kucun.40
Generic.f McAfee Win32.HLLM.Puppy
Generic.f McAfee BackDoor.Dya.35
Generic.f McAfee Trojan.Fursion
Generic.f McAfee BackDoor.Tasker.10
Generic.f McAfee Trojan.Niticat
Generic.f McAfee BackDoor.Erazer.11
Generic.f McAfee BackDoor.Reversa.13
Generic.f McAfee BackDoor.Reversa.12
Generic.f McAfee BackDoor.Reversa.11
Generic.f McAfee BackDoor.Reversa.14
Generic.f McAfee Trojan.Ircnot
Generic.f McAfee Trojan.MulDrop.938
Generic.f McAfee Trojan.AgentSpy
Generic.f McAfee BackDoor.Reversa.10
Generic.f McAfee BackDoor.Generic.1054
Generic.f McAfee BackDoor.Sentry.10
Generic.f McAfee Chitbind.Generator
Generic.f McAfee BackDoor.Generic.25
Generic.f McAfee BackDoor.Rcs
Generic.f McAfee Trojan.Click.65
Generic.f McAfee BackDoor.Troy.10
Generic.f McAfee Trojan.DownLoader.419
Generic.f McAfee Trojan.Easy.10
Generic.f McAfee BackDoor.Serveur
Generic.f McAfee Trojan.Siquid
Generic.f McAfee Trojan.StamLoader
Generic.f McAfee Trojan.Xping
Generic.f McAfee BackDoor.Hostem
Generic.f McAfee Trojan.Ersaf

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.