Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.MZ40M2 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.6362
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2762
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.59430
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.58138
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4892
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4898
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Wsgame.13924
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Banker.32420
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Siggen.1389
TROJ_Gen.MZ40M2 Trend Micro Trojan.Popuper.15987
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4862
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4839
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4841
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop.55855
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen2.6727
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Banker.51712
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.22846
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.28084
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Wsgame.14023
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Spy.9346
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Spy.419
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.26050
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad2.16911
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4965
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2746
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop.55240
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.Mailkl.4
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2725
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.27295
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.13766
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Banker.32418
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.Facebook.316
TROJ_Gen.MZ40M2 Trend Micro Tool.MessenPass.10
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.17303
TROJ_Gen.MZ40M2 Trend Micro BackDoor.IRC.Sdbot.5593
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Bifrost.1882
TROJ_Gen.MZ40M2 Trend Micro Trojan.Vanti.380
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.28269
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.13057
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2755
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.14137
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.54023
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.7509
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.12830
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop.40715
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.Autoruner.8900
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.12122
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.17457

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.