Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Unpacked.Gen aliases:

Name Vendor Dr.Web classification name
TR/Unpacked.Gen Avira Trojan.Webcon
TR/Unpacked.Gen Avira BackDoor.Haxdoor.142
TR/Unpacked.Gen Avira BackDoor.IRC.Subot
TR/Unpacked.Gen Avira BackDoor.Haxdoor
TR/Unpacked.Gen Avira Trojan.KeySpy
TR/Unpacked.Gen Avira Trojan.MulDrop.1337
TR/Unpacked.Gen Avira BackDoor.GWGirl.272
TR/Unpacked.Gen Avira BackDoor.Haxdoor.145
TR/Unpacked.Gen Avira BackDoor.Haxdoor.147
TR/Unpacked.Gen Avira Trojan.MulDrop.235
TR/Unpacked.Gen Avira Trojan.MulDrop.4645
TR/Unpacked.Gen Avira BackDoor.Haxdoor.378
TR/Unpacked.Gen Avira Trojan.TencentAd
TR/Unpacked.Gen Avira BackDoor.Haxdoor.151
TR/Unpacked.Gen Avira BackDoor.Haxdoor.377
TR/Unpacked.Gen Avira BackDoor.Haxdoor.312
TR/Unpacked.Gen Avira BackDoor.Bifrost.168
TR/Unpacked.Gen Avira BackDoor.Bandito.10
TR/Unpacked.Gen Avira BackDoor.Generic.858
TR/Unpacked.Gen Avira BackDoor.IRC.Mfv
TR/Unpacked.Gen Avira BackDoor.Dumaru.43
TR/Unpacked.Gen Avira BackDoor.BirdSpy.30
TR/Unpacked.Gen Avira BackDoor.Haxdoor.187
TR/Unpacked.Gen Avira BackDoor.Haxdoor.546
TR/Unpacked.Gen Avira BackDoor.Haxdoor.139
TR/Unpacked.Gen Avira BackDoor.Haxdoor.167
TR/Unpacked.Gen Avira BackDoor.Hobbit.1
TR/Unpacked.Gen Avira BackDoor.Chen
TR/Unpacked.Gen Avira BackDoor.Dersp
TR/Unpacked.Gen Avira Trojan.Siggen
TR/Unpacked.Gen Avira BackDoor.CMD
TR/Unpacked.Gen Avira BackDoor.Generic.1475
TR/Unpacked.Gen Avira BackDoor.Dumaru
TR/Unpacked.Gen Avira BackDoor.Dumaru.64000
TR/Unpacked.Gen Avira BackDoor.Dumaru.42
TR/Unpacked.Gen Avira BackDoor.Lithium.10
TR/Unpacked.Gen Avira BackDoor.Konsl
TR/Unpacked.Gen Avira BackDoor.Relback
TR/Unpacked.Gen Avira BackDoor.Jinxy
TR/Unpacked.Gen Avira BackDoor.Haxdoor.163
TR/Unpacked.Gen Avira Trojan.LowZones.187
TR/Unpacked.Gen Avira Trojan.LowZones.82
TR/Unpacked.Gen Avira Trojan.StartPage.20167
TR/Unpacked.Gen Avira Trojan.LowZones.180
TR/Unpacked.Gen Avira Win32.HLLW.Puce
TR/Unpacked.Gen Avira Trojan.Proxy.3281
TR/Unpacked.Gen Avira Win32.HLLW.Copia
TR/Unpacked.Gen Avira Trojan.Spambot.2496
TR/Unpacked.Gen Avira Win32.HLLM.MyDoom.96
TR/Unpacked.Gen Avira Trojan.PWS.Wow

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies