Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.MZ40M2 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.551
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.Autoruner.30083
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.11466
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Panda.122
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.21470
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoader.24862
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.18236
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Spy.193
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Wsgame.14902
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.Autoruner.8459
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Panda.117
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.22385
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.3404
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.3550
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Banker.32155
TROJ_Gen.MZ40M2 Trend Micro Dialer.Siggen.129
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.31853
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop.40022
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.5224
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Bifrost.14353
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.3965
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.28038
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.6786
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.30108
TROJ_Gen.MZ40M2 Trend Micro Trojan.StartPage.22779
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.32009
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.30914
TROJ_Gen.MZ40M2 Trend Micro Trojan.Swizzor.13893
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.51333
TROJ_Gen.MZ40M2 Trend Micro Program.Wpe
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.51641
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.5760
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4014
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.3006
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.6186
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.Autoruner.8549
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5639
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.11982
TROJ_Gen.MZ40M2 Trend Micro Trojan.Spambot.5912
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4372
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoader1.14290
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.31272
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4256
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop.40175
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.6929
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Dosia.1410
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Banker.31412
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.32186
TROJ_Gen.MZ40M2 Trend Micro Trojan.Raber.75
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.52425

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.