Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.MZ40M2 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.7540
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop1.20439
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.8145
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.36514
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4509
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2656
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.29889
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.31882
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.57847
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.22294
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.26916
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.Autoruner.33644
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.6280
TROJ_Gen.MZ40M2 Trend Micro Trojan.Bytok.63
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Spy.422
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.15745
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop.55383
TROJ_Gen.MZ40M2 Trend Micro Adware.Siggen.546
TROJ_Gen.MZ40M2 Trend Micro Trojan.Swizzor.13322
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Bifrost.1052
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4410
TROJ_Gen.MZ40M2 Trend Micro Trojan.KillFiles.1065
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.31561
TROJ_Gen.MZ40M2 Trend Micro Adware.BargainBuddy.146
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4669
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.15524
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.7449
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.52849
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4485
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4581
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen2.9385
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLW.MyBot.166
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen1.60378
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.46081
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.53002
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2659
TROJ_Gen.MZ40M2 Trend Micro Trojan.Click.32022
TROJ_Gen.MZ40M2 Trend Micro BackDoor.IRC.Sdbot.5499
TROJ_Gen.MZ40M2 Trend Micro BackDoor.Pigeon.25857
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2660
TROJ_Gen.MZ40M2 Trend Micro Adware.Cinmus.2679
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad.52039
TROJ_Gen.MZ40M2 Trend Micro Trojan.MulDrop.36643
TROJ_Gen.MZ40M2 Trend Micro Trojan.DownLoad1.13087
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.12336
TROJ_Gen.MZ40M2 Trend Micro Win32.HLLM.Beagle.519
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4576
TROJ_Gen.MZ40M2 Trend Micro Trojan.Packed.4613
TROJ_Gen.MZ40M2 Trend Micro Trojan.Inject.3299
TROJ_Gen.MZ40M2 Trend Micro Trojan.Siggen.7804

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.