Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIM aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.2084
TROJ_Generic.DIM Trend Micro Win32.HLLM.Beagle.219
TROJ_Generic.DIM Trend Micro Trojan.Siggen.402
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.46482
TROJ_Generic.DIM Trend Micro Adware.Hotbot
TROJ_Generic.DIM Trend Micro Exploit.DCom.197
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.38511
TROJ_Generic.DIM Trend Micro Trojan.PWS.Qqpass.1921
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.12378
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.35134
TROJ_Generic.DIM Trend Micro Trojan.Virtumod.569
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.52525
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.55522
TROJ_Generic.DIM Trend Micro BackDoor.Pigeon.7872
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.28262
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.18245
TROJ_Generic.DIM Trend Micro Win32.HLLW.Medbod.116
TROJ_Generic.DIM Trend Micro Win32.HLLW.Medbod
TROJ_Generic.DIM Trend Micro Win32.HLLW.Medbod.118
TROJ_Generic.DIM Trend Micro Trojan.Hitpop.289
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.5080
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.3788
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.20145
TROJ_Generic.DIM Trend Micro BackDoor.Fatal
TROJ_Generic.DIM Trend Micro Adware.Surfside
TROJ_Generic.DIM Trend Micro Adware.Cinmus.15986
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6624
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.59070
TROJ_Generic.DIM Trend Micro Trojan.Packed.490
TROJ_Generic.DIM Trend Micro Trojan.Blackmailer.332
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.61287
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.44952
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.24002
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.19253
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3582
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3611
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3609
TROJ_Generic.DIM Trend Micro Trojan.Packed.1197
TROJ_Generic.DIM Trend Micro Trojan.Siggen.55
TROJ_Generic.DIM Trend Micro BackDoor.Bulknet.195
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6659
TROJ_Generic.DIM Trend Micro Trojan.Sharer.20
TROJ_Generic.DIM Trend Micro Win32.HLLW.MyBot.133
TROJ_Generic.DIM Trend Micro Trojan.Inject.902
TROJ_Generic.DIM Trend Micro Trojan.LowZones.927
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.12745
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.17039
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.54169
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6145
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6149

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.