Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.CZ0149 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.33163
TROJ_Gen.CZ0149 Trend Micro Trojan.Inject.5512
TROJ_Gen.CZ0149 Trend Micro Trojan.Packed.213
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoader.59802
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.35516
TROJ_Gen.CZ0149 Trend Micro Trojan.Virtumod.1710
TROJ_Gen.CZ0149 Trend Micro BackDoor.Pigeon.22160
TROJ_Gen.CZ0149 Trend Micro Trojan.Swizzor.based
TROJ_Gen.CZ0149 Trend Micro Win32.HLLW.Autohit.7954
TROJ_Gen.CZ0149 Trend Micro Trojan.Swizzor.10644
TROJ_Gen.CZ0149 Trend Micro Trojan.Siggen.4866
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.29357
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoader1.779
TROJ_Gen.CZ0149 Trend Micro BackDoor.Siggen.138
TROJ_Gen.CZ0149 Trend Micro Trojan.PWS.Panda.31
TROJ_Gen.CZ0149 Trend Micro Trojan.KillProc.1565
TROJ_Gen.CZ0149 Trend Micro Trojan.KeyLogger.3411
TROJ_Gen.CZ0149 Trend Micro BackDoor.Pigeon.24532
TROJ_Gen.CZ0149 Trend Micro Trojan.Swizzor.10322
TROJ_Gen.CZ0149 Trend Micro Trojan.Packed.366
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.14017
TROJ_Gen.CZ0149 Trend Micro Win32.HLLW.Autoruner.6752
TROJ_Gen.CZ0149 Trend Micro BackDoor.PcClient.876
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.33658
TROJ_Gen.CZ0149 Trend Micro Trojan.Click.25482
TROJ_Gen.CZ0149 Trend Micro Trojan.Fakealert.12098
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.32916
TROJ_Gen.CZ0149 Trend Micro Win32.HLLW.Siggen.56
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.28462
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad1.40309
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.42247
TROJ_Gen.CZ0149 Trend Micro Trojan.PWS.Gamania.20317
TROJ_Gen.CZ0149 Trend Micro BackDoor.Spy.422
TROJ_Gen.CZ0149 Trend Micro BackDoor.Pigeon.30792
TROJ_Gen.CZ0149 Trend Micro Trojan.Siggen.5291
TROJ_Gen.CZ0149 Trend Micro Trojan.Siggen.5852
TROJ_Gen.CZ0149 Trend Micro Trojan.Fakealert.5628
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.52754
TROJ_Gen.CZ0149 Trend Micro Trojan.Siggen.16152
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad1.18131
TROJ_Gen.CZ0149 Trend Micro BackDoor.Teladrator.32
TROJ_Gen.CZ0149 Trend Micro Trojan.Siggen.14757
TROJ_Gen.CZ0149 Trend Micro BackDoor.Siggen.1907
TROJ_Gen.CZ0149 Trend Micro Trojan.DownLoad.53921

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.