Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.XZ33A0 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.XZ33A0 Trend Micro Trojan.MulDrop.14115
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoader.46642
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Panda.117
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Legmir.1496
TROJ_Gen.XZ33A0 Trend Micro Adware.IEHelper
TROJ_Gen.XZ33A0 Trend Micro Trojan.Packed.213
TROJ_Gen.XZ33A0 Trend Micro Adware.ZenoSearch.4
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Banker.21172
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Wsgame.10359
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Wsgame.10375
TROJ_Gen.XZ33A0 Trend Micro Trojan.NtRootKit.686
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Multi.2
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoader.1016
TROJ_Gen.XZ33A0 Trend Micro Trojan.MulDrop.12716
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad.3816
TROJ_Gen.XZ33A0 Trend Micro Trojan.KeyLogger.1832
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad.35173
TROJ_Gen.XZ33A0 Trend Micro Trojan.KeyLogger.27
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad.8773
TROJ_Gen.XZ33A0 Trend Micro Trojan.MulDrop.8323
TROJ_Gen.XZ33A0 Trend Micro Trojan.Microjo.17
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad.14017
TROJ_Gen.XZ33A0 Trend Micro Trojan.Packed.228
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad.38548
TROJ_Gen.XZ33A0 Trend Micro Trojan.Click.19777
TROJ_Gen.XZ33A0 Trend Micro Trojan.Raber.3
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoader.25334
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.LDPinch.4132
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Qqpass.4336
TROJ_Gen.XZ33A0 Trend Micro BackDoor.Attack.44
TROJ_Gen.XZ33A0 Trend Micro BackDoor.Beizhu.2487
TROJ_Gen.XZ33A0 Trend Micro Trojan.Fakealert.4407
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad1.36084
TROJ_Gen.XZ33A0 Trend Micro Trojan.KeyLogger.1658
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad.5202
TROJ_Gen.XZ33A0 Trend Micro Trojan.Winhelp
TROJ_Gen.XZ33A0 Trend Micro Trojan.KeyLogger.1638
TROJ_Gen.XZ33A0 Trend Micro BackDoor.Goth.67
TROJ_Gen.XZ33A0 Trend Micro Trojan.Packed.485
TROJ_Gen.XZ33A0 Trend Micro Trojan.MulDrop.15082
TROJ_Gen.XZ33A0 Trend Micro Trojan.Packed.365
TROJ_Gen.XZ33A0 Trend Micro Trojan.MulDrop.15542
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoader.62226
TROJ_Gen.XZ33A0 Trend Micro Win32.HLLW.Autoruner.1131
TROJ_Gen.XZ33A0 Trend Micro BackDoor.Pigeon.12692
TROJ_Gen.XZ33A0 Trend Micro Trojan.MulDrop.31605
TROJ_Gen.XZ33A0 Trend Micro Trojan.MulDrop.13981
TROJ_Gen.XZ33A0 Trend Micro Trojan.Packed.149
TROJ_Gen.XZ33A0 Trend Micro Trojan.PWS.Wsgame.4983
TROJ_Gen.XZ33A0 Trend Micro Trojan.DownLoad.30758

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.