Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.MZ40M2 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.5102
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.6514
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.6154
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4373
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.32166
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.37482
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4123
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Bifrost.14569
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.34054
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click1.27584
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.1748
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4294
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen1.58133
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.52667
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Banker.32269
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.28049
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.57249
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4359
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4336
TROJ_Gen.MZ40M2 Trend Micro Trojan.Proxy.10515
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5983
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5946
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.57168
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop1.52376
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5910
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5686
TROJ_Gen.MZ40M2 Trend Micro Tool.PassView.179
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.22057
TROJ_Gen.MZ40M2 Trend Micro Exploit.Dameware.20
TROJ_Gen.MZ40M2 Trend Micro Joke.Forgery.33
TROJ_Gen.MZ40M2 Trend Micro BackDoor.IRC.Sdbot.5801
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4215
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.31751
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.32579
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.8635
TROJ_Gen.MZ40M2 Trend Micro Trojan.Proxy.7927
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5669
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.11676
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.6490
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4305
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4337
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5953
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.5315
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4133
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4330
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4387
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.11919
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.13744
TROJ_Gen.MZ40M2 Trend Micro Trojan.PWS.Siggen.9896
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.60665

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.