Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic.G aliases:

Name Vendor Dr.Web classification name
Generic.g McAfee Trojan.DownLoader.3584
Generic.g McAfee Trojan.Click.179
Generic.g McAfee Trojan.MulDrop.847
Generic.g McAfee BackDoor.Exception
Generic.g McAfee Trojan.MulDrop.734
Generic.g McAfee BackDoor.Generic.733
Generic.g McAfee Trojan.PWS.Pwkiller
Generic.g McAfee Exploit.IISMisc
Generic.g McAfee Trojan.Phax
Generic.g McAfee Trojan.PWS.Xinkey
Generic.g McAfee Trojan.Songon
Generic.g McAfee Trojan.Mutapag
Generic.g McAfee Trojan.PWS.Portal
Generic.g McAfee Trojan.DownLoader.219
Generic.g McAfee Trojan.Webster
Generic.g McAfee Trojan.MailBomber
Generic.g McAfee IRC.Randon
Generic.g McAfee BackDoor.Mosu.22
Generic.g McAfee Trojan.Dalog.10
Generic.g McAfee Trojan.Loper.201
Generic.g McAfee Trojan.Hotkit
Generic.g McAfee Trojan.KeyHunt
Generic.g McAfee Trojan.PWS.LDPinch
Generic.g McAfee FDOS.Emailer
Generic.g McAfee Trojan.MulDrop.686
Generic.g McAfee Trojan.DownLoader.400
Generic.g McAfee BackDoor.BadRat
Generic.g McAfee Trojan.Notify
Generic.g McAfee Trojan.MulDrop.1923
Generic.g McAfee Trojan.Regcontr
Generic.g McAfee Trojan.KeyLogger.81
Generic.g McAfee Trojan.Dks.11
Generic.g McAfee Flooder.Damail
Generic.g McAfee Trojan.MulDrop.435
Generic.g McAfee Trojan.DownLoader.1352
Generic.g McAfee Trojan.Atmaca.10
Generic.g McAfee Trojan.DownLoader.15800
Generic.g McAfee Trojan.Jonnil
Generic.g McAfee DUOS.Generator
Generic.g McAfee BackDoor.Ducker
Generic.g McAfee BackDoor.AimVision.14
Generic.g McAfee BackDoor.Fearless.15
Generic.g McAfee Trojan.Imafraid
Generic.g McAfee Trojan.MulDrop.305
Generic.g McAfee Trojan.StartPage.547
Generic.g McAfee Trojan.Isbar
Generic.g McAfee Trojan.PWS.Fakemsn
Generic.g McAfee Trojan.Aphex.10
Generic.g McAfee Trojan.DownLoader.124
Generic.g McAfee Trojan.MulDrop.946

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.