Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_GEN.0X0312S aliases:

Name Vendor Dr.Web classification name
TROJ_GEN.0X0312S Trend Micro Trojan.PWS.Wsgame.9782
TROJ_GEN.0X0312S Trend Micro Trojan.Packed.365
TROJ_GEN.0X0312S Trend Micro Trojan.MulDrop.23527
TROJ_GEN.0X0312S Trend Micro Win32.HLLW.Autohit.7890
TROJ_GEN.0X0312S Trend Micro Adware.Siggen.19
TROJ_GEN.0X0312S Trend Micro BackDoor.Poison.1
TROJ_GEN.0X0312S Trend Micro Win32.HLLM.Limar.2220
TROJ_GEN.0X0312S Trend Micro Trojan.Blackmailer.953
TROJ_GEN.0X0312S Trend Micro Trojan.NtRootKit.2694
TROJ_GEN.0X0312S Trend Micro Win32.HLLW.Autoruner.4293
TROJ_GEN.0X0312S Trend Micro Win32.HLLW.Autoruner.5603
TROJ_GEN.0X0312S Trend Micro Win32.HLLW.Autoruner.4360
TROJ_GEN.0X0312S Trend Micro BackDoor.Tdss.34
TROJ_GEN.0X0312S Trend Micro Trojan.PWS.Qqpass
TROJ_GEN.0X0312S Trend Micro Trojan.DownLoad.25698
TROJ_GEN.0X0312S Trend Micro Trojan.Packed.370
TROJ_GEN.0X0312S Trend Micro Trojan.LydraSpy.1339
TROJ_GEN.0X0312S Trend Micro Trojan.PWS.LDPinch.2375
TROJ_GEN.0X0312S Trend Micro Trojan.Click.385
TROJ_GEN.0X0312S Trend Micro BackDoor.Dosia.108
TROJ_GEN.0X0312S Trend Micro Trojan.Packed.448
TROJ_GEN.0X0312S Trend Micro Trojan.DownLoader1.1521
TROJ_GEN.0X0312S Trend Micro Trojan.KeyLogger.3234
TROJ_GEN.0X0312S Trend Micro Trojan.Mssmsgs.373
TROJ_GEN.0X0312S Trend Micro Trojan.DownLoad.39134
TROJ_GEN.0X0312S Trend Micro Trojan.DownLoad.12946
TROJ_GEN.0X0312S Trend Micro Trojan.Packed.633
TROJ_GEN.0X0312S Trend Micro BackDoor.Tdss.51
TROJ_GEN.0X0312S Trend Micro Trojan.Blackmailer.870
TROJ_GEN.0X0312S Trend Micro Win32.HLLW.Autoruner.5793
TROJ_GEN.0X0312S Trend Micro Trojan.DownLoader.49586
TROJ_GEN.0X0312S Trend Micro Trojan.Spambot.3141
TROJ_GEN.0X0312S Trend Micro Trojan.Click.18048
TROJ_GEN.0X0312S Trend Micro Trojan.Fakealert.536
TROJ_GEN.0X0312S Trend Micro Trojan.PWS.Stealer.129
TROJ_GEN.0X0312S Trend Micro Trojan.PWS.Qqpass.2556
TROJ_GEN.0X0312S Trend Micro Trojan.Proxy.4002
TROJ_GEN.0X0312S Trend Micro Trojan.DownLoad.32229
TROJ_GEN.0X0312S Trend Micro Trojan.Skimer.6
TROJ_GEN.0X0312S Trend Micro Trojan.DnsChange.999
TROJ_GEN.0X0312S Trend Micro BackDoor.ProRat.252
TROJ_GEN.0X0312S Trend Micro Win32.HLLW.Autohit.6917
TROJ_GEN.0X0312S Trend Micro Trojan.MulDrop.30257
TROJ_GEN.0X0312S Trend Micro Trojan.MulDrop.30211
TROJ_GEN.0X0312S Trend Micro BackDoor.Beast.21
TROJ_GEN.0X0312S Trend Micro Adware.Baidu.1014
TROJ_GEN.0X0312S Trend Micro Adware.Baidu.1002
TROJ_GEN.0X0312S Trend Micro Adware.Baidu.996
TROJ_GEN.0X0312S Trend Micro Trojan.Blackmailer.755
TROJ_GEN.0X0312S Trend Micro Win32.HLLM.Generic.355

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.