Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.RE50B6 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.RE50B6 Trend Micro Trojan.MulDrop.17449
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.56263
TROJ_Gen.RE50B6 Trend Micro Trojan.DownLoad1.35764
TROJ_Gen.RE50B6 Trend Micro Trojan.PWS.Panda.171
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.59864
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.63868
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.59199
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.63600
TROJ_Gen.RE50B6 Trend Micro Trojan.PWS.Panda.122
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.63635
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.63989
TROJ_Gen.RE50B6 Trend Micro Trojan.Fakealert.12062
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.60844
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.60841
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.63480
TROJ_Gen.RE50B6 Trend Micro Trojan.PWS.Wsgame.17248
TROJ_Gen.RE50B6 Trend Micro Trojan.PWS.Panda.114
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.3002
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.3191
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.4031
TROJ_Gen.RE50B6 Trend Micro Trojan.Click.37916
TROJ_Gen.RE50B6 Trend Micro Trojan.Proxy.6752
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.3112
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.17439
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.17332
TROJ_Gen.RE50B6 Trend Micro Trojan.PWS.Gamania.21356
TROJ_Gen.RE50B6 Trend Micro Trojan.Fakealert.5591
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.4263
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5662
TROJ_Gen.RE50B6 Trend Micro Trojan.PWS.Gamania.21749
TROJ_Gen.RE50B6 Trend Micro Trojan.Siggen.24935
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5573
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.4121
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.6125
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5362
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.13212
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5793
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5563
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5450
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5720
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.5774
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.6754
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.6085
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.6619
TROJ_Gen.RE50B6 Trend Micro Trojan.Fakealert.5818
TROJ_Gen.RE50B6 Trend Micro Trojan.Packed.6335
TROJ_Gen.RE50B6 Trend Micro Trojan.PWS.Gamania.21160
TROJ_Gen.RE50B6 Trend Micro Trojan.Proxy.7577
TROJ_Gen.RE50B6 Trend Micro Trojan.Click.28857
TROJ_Gen.RE50B6 Trend Micro Trojan.Proxy.8169

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.