Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic Dropper.i aliases:

Name Vendor Dr.Web classification name
Generic Dropper.i McAfee Trojan.DownLoader.3879
Generic Dropper.i McAfee Trojan.DownLoader.3533
Generic Dropper.i McAfee Trojan.MulDrop.2567
Generic Dropper.i McAfee Win32.IRC.Bot.based
Generic Dropper.i McAfee Trojan.DownLoader.3966
Generic Dropper.i McAfee Trojan.KillProc
Generic Dropper.i McAfee BackDoor.SService.10
Generic Dropper.i McAfee BackDoor.NetSphere.130
Generic Dropper.i McAfee BackDoor.XLog.22
Generic Dropper.i McAfee Trojan.WinSpy
Generic Dropper.i McAfee Trojan.PWS.Banker.784
Generic Dropper.i McAfee BackDoor.Commandos
Generic Dropper.i McAfee IRC.Flood
Generic Dropper.i McAfee Trojan.MulDrop.37
Generic Dropper.i McAfee Trojan.MulDrop.2582
Generic Dropper.i McAfee Trojan.DownLoader.3948
Generic Dropper.i McAfee Trojan.MulDrop.2998
Generic Dropper.i McAfee BackDoor.NetSphere.131
Generic Dropper.i McAfee Trojan.MulDrop.433
Generic Dropper.i McAfee BackDoor.Breach.2001
Generic Dropper.i McAfee BackDoor.Nirvana
Generic Dropper.i McAfee BackDoor.Abacab.9
Generic Dropper.i McAfee Trojan.MulDrop.2373
Generic Dropper.i McAfee Trojan.MulDrop.2981
Generic Dropper.i McAfee Trojan.Ares.618
Generic Dropper.i McAfee Trojan.MulDrop.2534
Generic Dropper.i McAfee Trojan.LowZones
Generic Dropper.i McAfee Win32.HLLP.Jeefo.36352
Generic Dropper.i McAfee Trojan.DownLoader.5747
Generic Dropper.i McAfee Trojan.MulDrop.2766
Generic Dropper.i McAfee Trojan.MulDrop.905
Generic Dropper.i McAfee Trojan.Exebund.22
Generic Dropper.i McAfee BackDoor.Ifinst
Generic Dropper.i McAfee Trojan.PWS.Mof
Generic Dropper.i McAfee Trojan.MulDrop.3259
Generic Dropper.i McAfee Trojan.PWS.Banker.based
Generic Dropper.i McAfee Trojan.PWS.Banker.1136
Generic Dropper.i McAfee Trojan.Proxy.377
Generic Dropper.i McAfee Trojan.Flood.22016
Generic Dropper.i McAfee BackDoor.Iroffer.1401
Generic Dropper.i McAfee Trojan.Selfexec
Generic Dropper.i McAfee Trojan.DownLoader.6084
Generic Dropper.i McAfee Tool.FireDaemon
Generic Dropper.i McAfee BackDoor.Pigeon.128
Generic Dropper.i McAfee Trojan.MulDrop.3085
Generic Dropper.i McAfee Adware.CFS
Generic Dropper.i McAfee Trojan.PWS.Banker.791
Generic Dropper.i McAfee Trojan.IP98
Generic Dropper.i McAfee Trojan.DownLoader.886
Generic Dropper.i McAfee BackDoor.Illusion

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.