Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.4X0244 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.4X0244 Trend Micro Adware.Allsum
TROJ_Gen.4X0244 Trend Micro Trojan.MulDrop.18374
TROJ_Gen.4X0244 Trend Micro Trojan.MulDrop.11132
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoader.30849
TROJ_Gen.4X0244 Trend Micro Trojan.Packed.166
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoader.38035
TROJ_Gen.4X0244 Trend Micro BackDoor.Phantom.22
TROJ_Gen.4X0244 Trend Micro BackDoor.Huai.2951
TROJ_Gen.4X0244 Trend Micro BackDoor.Poison.1032
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoad1.42199
TROJ_Gen.4X0244 Trend Micro Trojan.Inject.2021
TROJ_Gen.4X0244 Trend Micro Trojan.Virtumod.7491
TROJ_Gen.4X0244 Trend Micro Trojan.Virtumod.481
TROJ_Gen.4X0244 Trend Micro Win32.HLLW.GenKey
TROJ_Gen.4X0244 Trend Micro Trojan.MulDrop.12758
TROJ_Gen.4X0244 Trend Micro BackDoor.Bifrost.779
TROJ_Gen.4X0244 Trend Micro Trojan.Siggen.58020
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoader.30827
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoad.4884
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.Banker.9493
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.Banker.14008
TROJ_Gen.4X0244 Trend Micro BackDoor.Pigeon.20902
TROJ_Gen.4X0244 Trend Micro Trojan.MulDrop.16140
TROJ_Gen.4X0244 Trend Micro Trojan.Virtumod.441
TROJ_Gen.4X0244 Trend Micro Trojan.MulDrop.17525
TROJ_Gen.4X0244 Trend Micro Trojan.Fakealert.1500
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.Banker.19906
TROJ_Gen.4X0244 Trend Micro Trojan.MulDrop.18975
TROJ_Gen.4X0244 Trend Micro Win32.HLLW.Autoruner.4360
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.Panda.17
TROJ_Gen.4X0244 Trend Micro Trojan.Click.26353
TROJ_Gen.4X0244 Trend Micro Trojan.Gado.2
TROJ_Gen.4X0244 Trend Micro BackDoor.Pigeon.12081
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoad1.43043
TROJ_Gen.4X0244 Trend Micro Win32.HLLW.Autoruner.1083
TROJ_Gen.4X0244 Trend Micro Trojan.MulDrop.14128
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.Gamania.16858
TROJ_Gen.4X0244 Trend Micro Win32.HLLW.Autoruner.2787
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.QQDragon.43
TROJ_Gen.4X0244 Trend Micro Win32.HLLW.Autoruner.1657
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoader.32619
TROJ_Gen.4X0244 Trend Micro Trojan.Virtumod.493
TROJ_Gen.4X0244 Trend Micro Trojan.Starter.175
TROJ_Gen.4X0244 Trend Micro Trojan.Goner.84
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoad1.37899
TROJ_Gen.4X0244 Trend Micro Win32.HLLW.Generic.70
TROJ_Gen.4X0244 Trend Micro Win32.HLLW.Autoruner.2799
TROJ_Gen.4X0244 Trend Micro Trojan.DownLoader.50472
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.Banker.15526
TROJ_Gen.4X0244 Trend Micro Trojan.PWS.Gamania.9247

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.