Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_GEN.0X2412S aliases:

Name Vendor Dr.Web classification name
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8840
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8355
TROJ_GEN.0X2412S Trend Micro Trojan.Hidden.16385
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8207
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8216
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8236
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8083
TROJ_GEN.0X2412S Trend Micro Trojan.PWS.Webmonier.10
TROJ_GEN.0X2412S Trend Micro Trojan.PWS.GoldSpy.2713
TROJ_GEN.0X2412S Trend Micro Trojan.DownLoad.34654
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9847
TROJ_GEN.0X2412S Trend Micro Trojan.Maby.327
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9109
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9149
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9539
TROJ_GEN.0X2412S Trend Micro Trojan.PWS.Gamania.17783
TROJ_GEN.0X2412S Trend Micro BackDoor.Mirkov
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9521
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9384
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9618
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9616
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9624
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9513
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8205
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8321
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8359
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8239
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8324
TROJ_GEN.0X2412S Trend Micro Trojan.NtRootKit.1017
TROJ_GEN.0X2412S Trend Micro Trojan.DownLoader.54578
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8479
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.based
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9373
TROJ_GEN.0X2412S Trend Micro Trojan.MulDrop.15481
TROJ_GEN.0X2412S Trend Micro Trojan.DownLoader.22895
TROJ_GEN.0X2412S Trend Micro Trojan.Disabler.21
TROJ_GEN.0X2412S Trend Micro Trojan.DownLoad.31885
TROJ_GEN.0X2412S Trend Micro BackDoor.Way.10
TROJ_GEN.0X2412S Trend Micro Trojan.DownLoad.23691
TROJ_GEN.0X2412S Trend Micro Trojan.Inject.5512
TROJ_GEN.0X2412S Trend Micro Trojan.Virtumod.853
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.8789
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9172
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9042
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9409
TROJ_GEN.0X2412S Trend Micro Trojan.DnsChange.973
TROJ_GEN.0X2412S Trend Micro Trojan.Fakealert.11965
TROJ_GEN.0X2412S Trend Micro Trojan.PWS.Sands.236
TROJ_GEN.0X2412S Trend Micro Trojan.PWS.Gamania.15703
TROJ_GEN.0X2412S Trend Micro Trojan.Swizzor.9465

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.