Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.A aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.A Trend Micro Trojan.Virtumod.240
TROJ_Generic.A Trend Micro Trojan.DownLoader.52352
TROJ_Generic.A Trend Micro Win32.HLLW.MyBot.17
TROJ_Generic.A Trend Micro BackDoor.Kiddy
TROJ_Generic.A Trend Micro Trojan.DownLoader.50289
TROJ_Generic.A Trend Micro Trojan.PWS.Wsgame.4251
TROJ_Generic.A Trend Micro Trojan.Packed.194
TROJ_Generic.A Trend Micro BackDoor.Zbot
TROJ_Generic.A Trend Micro Trojan.KeyLogger.2328
TROJ_Generic.A Trend Micro Trojan.DownLoader.47115
TROJ_Generic.A Trend Micro Adware.ZenoSearch.6
TROJ_Generic.A Trend Micro Trojan.DownLoader.57739
TROJ_Generic.A Trend Micro Trojan.MulDrop.11135
TROJ_Generic.A Trend Micro Trojan.Cachespy
TROJ_Generic.A Trend Micro Trojan.MulDrop.10880
TROJ_Generic.A Trend Micro Trojan.DownLoader.33783
TROJ_Generic.A Trend Micro Trojan.DownLoader.36226
TROJ_Generic.A Trend Micro Trojan.PWS.Gamania.9883
TROJ_Generic.A Trend Micro Trojan.PWS.Wow.740
TROJ_Generic.A Trend Micro Trojan.PWS.Legmir.976
TROJ_Generic.A Trend Micro BackDoor.IRC.Sdbot.3362
TROJ_Generic.A Trend Micro Trojan.Click.18707
TROJ_Generic.A Trend Micro Trojan.Unsecure.6
TROJ_Generic.A Trend Micro Trojan.NtRootKit.1077
TROJ_Generic.A Trend Micro Adware.Tomato.5
TROJ_Generic.A Trend Micro Tool.Hijack
TROJ_Generic.A Trend Micro Adware.SearchAid.59
TROJ_Generic.A Trend Micro Trojan.MSNSpy.12
TROJ_Generic.A Trend Micro Trojan.PWS.Grabber.22
TROJ_Generic.A Trend Micro Trojan.DownLoader.49462
TROJ_Generic.A Trend Micro Trojan.Click.18031
TROJ_Generic.A Trend Micro Adware.SearchTwo
TROJ_Generic.A Trend Micro Adware.SearchTime
TROJ_Generic.A Trend Micro Trojan.DownLoader.31205
TROJ_Generic.A Trend Micro Trojan.PWS.Lineage.4554
TROJ_Generic.A Trend Micro Trojan.Inject.437
TROJ_Generic.A Trend Micro Trojan.Inject.484
TROJ_Generic.A Trend Micro Trojan.PWS.Gamania.10565
TROJ_Generic.A Trend Micro Trojan.PWS.Gamania.10280
TROJ_Generic.A Trend Micro BackDoor.Pigeon.13354
TROJ_Generic.A Trend Micro Trojan.DownLoader.36301
TROJ_Generic.A Trend Micro Trojan.DownLoader.50752
TROJ_Generic.A Trend Micro Trojan.MulDrop.15010
TROJ_Generic.A Trend Micro Trojan.DownLoader.53392
TROJ_Generic.A Trend Micro Win32.HLLW.Hina
TROJ_Generic.A Trend Micro Trojan.DownLoader.59535
TROJ_Generic.A Trend Micro Trojan.Stom.2
TROJ_Generic.A Trend Micro Trojan.Click.18117
TROJ_Generic.A Trend Micro Trojan.DownLoader.50817
TROJ_Generic.A Trend Micro BackDoor.Rejoice.145

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.