Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_GEN.0X0412S aliases:

Name Vendor Dr.Web classification name
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Wsgame.9805
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Wsgame.9819
TROJ_GEN.0X0412S Trend Micro Trojan.Fakealert.3932
TROJ_GEN.0X0412S Trend Micro Win32.HLLW.Autoruner.6321
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoad.3184
TROJ_GEN.0X0412S Trend Micro Trojan.DnsChange.973
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Gamania.7753
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Wsgame.10264
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Panda.30
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.LDPinch.3548
TROJ_GEN.0X0412S Trend Micro Trojan.Spambot.3531
TROJ_GEN.0X0412S Trend Micro Tool.Transmit.3
TROJ_GEN.0X0412S Trend Micro Tool.PassView.117
TROJ_GEN.0X0412S Trend Micro BackDoor.Tdss.59
TROJ_GEN.0X0412S Trend Micro Trojan.Virtumod.1937
TROJ_GEN.0X0412S Trend Micro BackDoor.Zapinit.106
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoad.30683
TROJ_GEN.0X0412S Trend Micro Trojan.NtRootKit.2685
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoad.1026
TROJ_GEN.0X0412S Trend Micro BackDoor.Darkshell.68
TROJ_GEN.0X0412S Trend Micro BackDoor.Bulknet.320
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Panda.5
TROJ_GEN.0X0412S Trend Micro BackDoor.Pigeon.18794
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoader.50307
TROJ_GEN.0X0412S Trend Micro BackDoor.BlackHole.2169
TROJ_GEN.0X0412S Trend Micro BackDoor.Poison
TROJ_GEN.0X0412S Trend Micro Trojan.MulDrop.29226
TROJ_GEN.0X0412S Trend Micro Trojan.MulDrop.29488
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Gamania.10892
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoader1.1421
TROJ_GEN.0X0412S Trend Micro Trojan.Inject.5559
TROJ_GEN.0X0412S Trend Micro Trojan.Inject.5556
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoad.854
TROJ_GEN.0X0412S Trend Micro Trojan.MulDrop.17441
TROJ_GEN.0X0412S Trend Micro BackDoor.Dosia
TROJ_GEN.0X0412S Trend Micro Trojan.Virtumod.12
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoad1.35868
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoad1.35656
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoader.12525
TROJ_GEN.0X0412S Trend Micro Trojan.Vanti.337
TROJ_GEN.0X0412S Trend Micro Trojan.MulDrop.29243
TROJ_GEN.0X0412S Trend Micro BackDoor.Flux.141
TROJ_GEN.0X0412S Trend Micro Trojan.MulDrop.17281
TROJ_GEN.0X0412S Trend Micro Trojan.MulDrop1.4386
TROJ_GEN.0X0412S Trend Micro Trojan.PWS.Gamania.7877
TROJ_GEN.0X0412S Trend Micro Trojan.Webmoner.60950
TROJ_GEN.0X0412S Trend Micro Win32.HLLW.Autoruner.2745
TROJ_GEN.0X0412S Trend Micro Trojan.DownLoad.38483
TROJ_GEN.0X0412S Trend Micro Trojan.Inject.3717
TROJ_GEN.0X0412S Trend Micro Trojan.Click.18048

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.