Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_GEN.0Z0914S aliases:

Name Vendor Dr.Web classification name
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.9120
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoad.4201
TROJ_GEN.0Z0914S Trend Micro Trojan.PWS.Panda.16
TROJ_GEN.0Z0914S Trend Micro Trojan.PWS.Gamania.10735
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoader.17676
TROJ_GEN.0Z0914S Trend Micro Trojan.Inject.3429
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.12520
TROJ_GEN.0Z0914S Trend Micro Trojan.Inject.225
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.19257
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.4855
TROJ_GEN.0Z0914S Trend Micro BackDoor.Winterlove
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoad.2069
TROJ_GEN.0Z0914S Trend Micro BackDoor.Bulknet.237
TROJ_GEN.0Z0914S Trend Micro Trojan.Packed.636
TROJ_GEN.0Z0914S Trend Micro Trojan.PWS.Wsgame.10170
TROJ_GEN.0Z0914S Trend Micro Trojan.Proxy.5880
TROJ_GEN.0Z0914S Trend Micro Trojan.Spambot.2419
TROJ_GEN.0Z0914S Trend Micro BackDoor.Siggen.199
TROJ_GEN.0Z0914S Trend Micro BackDoor.Bulknet.233
TROJ_GEN.0Z0914S Trend Micro BackDoor.BotNet.49
TROJ_GEN.0Z0914S Trend Micro Trojan.Proxy.3326
TROJ_GEN.0Z0914S Trend Micro Trojan.Packed.191
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoad.29175
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.13788
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoad.4884
TROJ_GEN.0Z0914S Trend Micro Trojan.Siggen.4546
TROJ_GEN.0Z0914S Trend Micro Trojan.Siggen.4547
TROJ_GEN.0Z0914S Trend Micro Trojan.PWS.LDPinch.4308
TROJ_GEN.0Z0914S Trend Micro Trojan.PWS.LDPinch.4182
TROJ_GEN.0Z0914S Trend Micro Trojan.PWS.Banker.27609
TROJ_GEN.0Z0914S Trend Micro Trojan.Packed.639
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoader.14209
TROJ_GEN.0Z0914S Trend Micro BackDoor.Pigeon.7888
TROJ_GEN.0Z0914S Trend Micro Trojan.Rent.27
TROJ_GEN.0Z0914S Trend Micro Trojan.AVKill.425
TROJ_GEN.0Z0914S Trend Micro Trojan.Swizzor.8393
TROJ_GEN.0Z0914S Trend Micro Trojan.Fakealert.3799
TROJ_GEN.0Z0914S Trend Micro Trojan.Packed.650
TROJ_GEN.0Z0914S Trend Micro Trojan.PWS.Panda.5
TROJ_GEN.0Z0914S Trend Micro Trojan.Packed.142
TROJ_GEN.0Z0914S Trend Micro Trojan.Packed.606
TROJ_GEN.0Z0914S Trend Micro Trojan.Spambot.3434
TROJ_GEN.0Z0914S Trend Micro Trojan.Click.18684
TROJ_GEN.0Z0914S Trend Micro BackDoor.Pigeon.21851
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoader.47563
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.5371
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.17530
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoader.10628
TROJ_GEN.0Z0914S Trend Micro Trojan.MulDrop.9396
TROJ_GEN.0Z0914S Trend Micro Trojan.DownLoad.2077

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.