Contents
Check Results

Check Results

How to open check results

If Dr.Web Scanner detects threats, the scanner_threat icon appears on the screen.

To open check results, tap the icon.

If SpIDer Guard detects a suspicious change in the system area or a threat, the following items appear on the screen:

An icon on the Android status bar in the top-left screen corner:

threatsicon on Android 5.0–11,

notifier_threat on Android 12 or later.

A pop-up notification about detection of a threat (see Figure 13).

The notif_monitor_threats (on Android 11 or earlier) or color_shield_red_day (on Android 12 or later) icon on the notification bar.

A message with a red indicator on the status bar.

To open check results, tap the notif_monitor_threats (color_shield_red_day) icon or the status bar message.

warning_green

On Android 5.0 or later, the threat notification will also appear on the lock screen. Tap it to access check results.

Neutralizing Threats

Neutralizing threats automatically

When threats are detected, Scanner and SpIDer Guard neutralize them automatically. In the components settings you can choose, which actions will be applied to the threats.

warning_green

In the centralized protection mode, when scan is initiated from the server, the actions applied to the threats are determined by the administrator.

Depending on the threat type, the following options might be available:

Report. Notifies on threat detection. Then, you choose actions for each of them manually.

Move to quarantine. Sends threats to the isolated folder (see the Quarantine section). If the threat is detected in an installed application, it cannot be moved to quarantine and you need to neutralize it manually.

Cure, move to quarantine if incurable. Attempts to revert the infected files and applications to the safe state. If it fails, sends them to an isolated folder.

Curing is available for some threats in system applications if root access is enabled on the device. If the threat is detected in an installed application, it cannot be moved to quarantine and you need to neutralize it manually.

Delete. Completely erases threats from the device memory. In some cases, Dr.Web cannot delete applications that use Android accessibility features. To remove such application manually, reboot to safe mode.

The option is not available for threats in system applications in the following cases:

If root access is not allowed on your device.

If the application cannot be safely deleted.

If a threat modification is detected. To identify if the app does pose a threat, report a false positive.

Cure, delete if incurable. Attempts to revert the infected files and applications to the safe state. If it fails, completely erases them from the device memory. In some cases, Dr.Web cannot delete applications that use Android accessibility features. To remove such application manually, reboot to safe mode.

Curing is available for some threats in system applications if root access is enabled on the device.

Ignore. Leaves threats as they are.

Neutralizing threats manually

Most of the threats are neutralized automatically according to the Scanner and SpIDer Guard settings. However, if Dr.Web uses centralized protection mode and connects to the server version 13.00.1 (17-03-2025 03:00:00) or earlier, you need to neutralize threats manually. Additionally, if Report is set up as the action for any threat type, you will also need to decide how to neutralize the detected threats of this type. To neutralize threats, tap scanner_threat.

On the neutralizing threats screen, you can review the list of threats and suspicious changes in the system area. For each object, its type and name are specified, as well as the icon of the recommended option for the object.

Objects are marked in different colors depending on the degree of danger. Listed below are the threat types in decreasing danger order:

1.Malware.

2.Riskware.

3.Hacktool program.

4.Adware.

5.Changes in the system area:

New files in system area.

Change of system files.

Deletion of system files.

6.Joke program.

To view the file path, select the object. For threats that are detected in apps, the app package name is also specified.

Neutralizing all threats

To delete all threats

In the top-right corner of the Check results screen, select Menu menu_bw > Delete all.

To move all threats to the quarantine

In the top-right corner of the Check results screen, select Menu menu_bw > All to quarantine.

Neutralizing one threat at a time

Each object has its own set of available options. Recommended actions are placed first. To expand the list, select the object. Possible options include:

i_cureCure. Attempts to revert the infected application to the safe state.

The option is available for some threats in system applications if root access is enabled on the device.

i_deleteDelete. Completely erases the threat from your device memory.

In some cases, Dr.Web cannot delete applications that use Android accessibility features. To remove such application manually, reboot to safe mode.

The option is not available for threats in system applications in the following cases:

If root access is not allowed on your device.

If the application cannot be safely deleted.

If a threat modification is detected. To identify if the app does pose a threat, report a false positive.

i_quarantineMove to quarantine. Moves the threat to an isolated folder (see Quarantine).

If the threat is detected in an installed application, it cannot be moved to the quarantine. In this case, the Move to quarantine option is not available.

i_ignoreIgnore. Leaves the change in the system area or the threat as it is.

block Block. Disables all internet connections for the application.

The option is available for threats in system applications.

i_fpSend to laboratory or False positive. Sends the file to the Doctor Web anti-virus laboratory for analysis. The analysis will show if there is a threat or it is a false positive. If it is a false positive error, it will be fixed. To receive the analysis results, enter your email address.

If the file is sent to the laboratory successfully, the Ignore option is automatically applied to the object.

The Send to laboratory option is available only for added or changed executable files in the system area: .jar, .odex, .so, APK, ELF files, etc.

The False positive option is available only for threat modifications and for threats detected in the system area.

i_infoMore on the Internet. Opens the page with the detected object description on the Doctor Web website.

Figure 16: Neutralizing threats

Figure 16: Neutralizing threats

Previous  Next