Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.MZ40L8 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.MZ40L8 Trend Micro Trojan.PWS.Wsgame.13165
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad1.12575
TROJ_Gen.MZ40L8 Trend Micro BackDoor.Pigeon.21219
TROJ_Gen.MZ40L8 Trend Micro Trojan.Starman.111
TROJ_Gen.MZ40L8 Trend Micro BackDoor.BBot.125
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad1.3127
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.20859
TROJ_Gen.MZ40L8 Trend Micro Trojan.Packed.687
TROJ_Gen.MZ40L8 Trend Micro Trojan.Packed.3149
TROJ_Gen.MZ40L8 Trend Micro Trojan.Click.30139
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad1.13439
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad1.12578
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad.51517
TROJ_Gen.MZ40L8 Trend Micro BackDoor.Pigeon.21851
TROJ_Gen.MZ40L8 Trend Micro BackDoor.Bifrost.8
TROJ_Gen.MZ40L8 Trend Micro Trojan.Inject.12772
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.11496
TROJ_Gen.MZ40L8 Trend Micro Trojan.Fakealert.8498
TROJ_Gen.MZ40L8 Trend Micro Trojan.PWS.Gamania.22546
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.11819
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad1.17417
TROJ_Gen.MZ40L8 Trend Micro BackDoor.Poison.1288
TROJ_Gen.MZ40L8 Trend Micro BackDoor.Bifrost
TROJ_Gen.MZ40L8 Trend Micro Trojan.BhoSiggen.3892
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.6635
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.33544
TROJ_Gen.MZ40L8 Trend Micro Adware.Benega.62
TROJ_Gen.MZ40L8 Trend Micro Adware.OneStep.148
TROJ_Gen.MZ40L8 Trend Micro Trojan.Click.28145
TROJ_Gen.MZ40L8 Trend Micro Trojan.Swizzor.based
TROJ_Gen.MZ40L8 Trend Micro Trojan.Packed.5992
TROJ_Gen.MZ40L8 Trend Micro Trojan.PWS.LDPinch.4690
TROJ_Gen.MZ40L8 Trend Micro BackDoor.IRC.Sdbot.10768
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.11818
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.13996
TROJ_Gen.MZ40L8 Trend Micro Trojan.MulDrop.47857
TROJ_Gen.MZ40L8 Trend Micro Adware.Cinmus.3555
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.23559
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.12250
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad1.12261
TROJ_Gen.MZ40L8 Trend Micro Trojan.MulDrop.37415
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.37577
TROJ_Gen.MZ40L8 Trend Micro Trojan.Siggen.14043
TROJ_Gen.MZ40L8 Trend Micro Trojan.DownLoad1.12576
TROJ_Gen.MZ40L8 Trend Micro Win32.HLLW.MyBot.6469
TROJ_Gen.MZ40L8 Trend Micro Trojan.PWS.Gamania.20397

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.