Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.MZ40Q4 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.51447
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.IRC.Sdbot.5785
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Pigeon.25370
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Bifrost
TROJ_Gen.MZ40Q4 Trend Micro Win32.HLLW.Autoruner.6326
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Winlock.337
TROJ_Gen.MZ40Q4 Trend Micro Trojan.PWS.Banker.33185
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Pigeon.41982
TROJ_Gen.MZ40Q4 Trend Micro Trojan.PWS.Bancos.1340
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Popuper.15887
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Siggen.2799
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Siggen.17944
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Hosts.212
TROJ_Gen.MZ40Q4 Trend Micro Trojan.PWS.Gamania.20319
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.56743
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Click1.24440
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Siggen.1015
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Click.27991
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Click.30883
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Siggen.19823
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Poison.1021
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Inject.6524
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Dosia.204
TROJ_Gen.MZ40Q4 Trend Micro Trojan.PWS.Banker.37910
TROJ_Gen.MZ40Q4 Trend Micro Trojan.MulDrop.52828
TROJ_Gen.MZ40Q4 Trend Micro Trojan.PWS.Wsgame.13822
TROJ_Gen.MZ40Q4 Trend Micro Trojan.MulDrop1.39820
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Click.37471
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoader1.37676
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Pigeon.26769
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Swizzor.based
TROJ_Gen.MZ40Q4 Trend Micro Trojan.MulDrop.55808
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.51378
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Swizzor
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Swizzor.13258
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Click.30691
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.52437
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.50513
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Siggen.3115
TROJ_Gen.MZ40Q4 Trend Micro Trojan.MulDrop.36786
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Siggen.12035
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Packed.6150
TROJ_Gen.MZ40Q4 Trend Micro Trojan.PWS.Banker.33268
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.52481
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.52669
TROJ_Gen.MZ40Q4 Trend Micro Trojan.Packed.6088
TROJ_Gen.MZ40Q4 Trend Micro Trojan.PWS.Gamania.20942
TROJ_Gen.MZ40Q4 Trend Micro Trojan.KillFiles.1046
TROJ_Gen.MZ40Q4 Trend Micro Trojan.DownLoad.52547
TROJ_Gen.MZ40Q4 Trend Micro BackDoor.Huai.6285

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.