Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic.k aliases:

Name Vendor Dr.Web classification name
Generic.k McAfee Trojan.DownLoader.3152
Generic.k McAfee BackDoor.IRC.Sdbot.90
Generic.k McAfee BackDoor.Bifrost
Generic.k McAfee Trojan.Cdkeys
Generic.k McAfee BackDoor.DarkMoon.66
Generic.k McAfee Win32.Detox.based
Generic.k McAfee BackDoor.IRC.Sdbot
Generic.k McAfee Trojan.Click.617
Generic.k McAfee BackDoor.IRC.Lazy
Generic.k McAfee Trojan.DownLoader.4474
Generic.k McAfee Trojan.DownLoader.4491
Generic.k McAfee Win32.IRC.Bot.based
Generic.k McAfee Trojan.Proxy.448
Generic.k McAfee BackDoor.IRC.Hozzer
Generic.k McAfee Win32.HLLW.MyBot
Generic.k McAfee Win32.HLLW.MyBot.based
Generic.k McAfee BackDoor.Oscar
Generic.k McAfee Win32.Benny.6382
Generic.k McAfee Trojan.Terminator
Generic.k McAfee Win32.Detox
Generic.k McAfee Trojan.MulDrop.1161
Generic.k McAfee Trojan.PWS.Grabber
Generic.k McAfee Win32.HLLW.MyBot.225
Generic.k McAfee BackDoor.IRC.Sdbot.642
Generic.k McAfee BackDoor.IRC.Sdbot.471
Generic.k McAfee Trojan.DownLoader.1436
Generic.k McAfee Trojan.MulDrop.9434
Generic.k McAfee BackDoor.IRC.Sdbot.954
Generic.k McAfee BackDoor.IRC.Lins
Generic.k McAfee Trojan.Siggen.2873
Generic.k McAfee BackDoor.Ninja
Generic.k McAfee Win32.HLLW.MyBot.4195
Generic.k McAfee Trojan.Siggen.3676
Generic.k McAfee Win32.HLLW.MyBot.3569
Generic.k McAfee Win32.HLLW.MyBot.3644
Generic.k McAfee Trojan.Siggen.61196
Generic.k McAfee Trojan.FuRootkit
Generic.k McAfee Trojan.Siggen1.4892
Generic.k McAfee Trojan.Siggen1.5389
Generic.k McAfee Trojan.Siggen.56173
Generic.k McAfee Trojan.Siggen.60597
Generic.k McAfee Trojan.Siggen.59451
Generic.k McAfee Trojan.DownLoader.8599
Generic.k McAfee Win32.HLLW.MyBot.23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.