Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIM aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.57165
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.24089
TROJ_Generic.DIM Trend Micro Adware.Ykemi.47
TROJ_Generic.DIM Trend Micro Adware.Websearch.12
TROJ_Generic.DIM Trend Micro Adware.Ykemi.53
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.24862
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.46242
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.24143
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.59773
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.64125
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.22816
TROJ_Generic.DIM Trend Micro Trojan.NtRootKit.452
TROJ_Generic.DIM Trend Micro Trojan.PWS.Wsgame.5231
TROJ_Generic.DIM Trend Micro DDoS.Rincux
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.6924
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.18937
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.15085
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.59963
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.8737
TROJ_Generic.DIM Trend Micro BackDoor.Pigeon.24536
TROJ_Generic.DIM Trend Micro Trojan.NtRootKit.790
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.59005
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.30463
TROJ_Generic.DIM Trend Micro Trojan.Disabler.29
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.9365
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.35868
TROJ_Generic.DIM Trend Micro Trojan.PWS.Qqshou
TROJ_Generic.DIM Trend Micro Trojan.PWS.Tanspy.1567
TROJ_Generic.DIM Trend Micro BackDoor.ColdFusion.12
TROJ_Generic.DIM Trend Micro BackDoor.Nels
TROJ_Generic.DIM Trend Micro Trojan.Popuper.15055
TROJ_Generic.DIM Trend Micro Trojan.Popuper.15049
TROJ_Generic.DIM Trend Micro Trojan.AVKill.408
TROJ_Generic.DIM Trend Micro Trojan.PWS.Qqpass.400
TROJ_Generic.DIM Trend Micro Trojan.PWS.LDPinch.4182
TROJ_Generic.DIM Trend Micro Trojan.Popuper.9297
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6963
TROJ_Generic.DIM Trend Micro Trojan.Popuper.5886
TROJ_Generic.DIM Trend Micro Exploit.DCom.196
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.15995
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.18420
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.18239
TROJ_Generic.DIM Trend Micro Adware.Msm.30
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.15703
TROJ_Generic.DIM Trend Micro Trojan.PWS.Panda.31
TROJ_Generic.DIM Trend Micro Trojan.Virtumod.519
TROJ_Generic.DIM Trend Micro Trojan.Virtumod.570
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.47659
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.5555
TROJ_Generic.DIM Trend Micro Trojan.AdVirtualNetwork.2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.