Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIM aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIM Trend Micro Adware.Ezula
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3578
TROJ_Generic.DIM Trend Micro Trojan.Siggen.83
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3632
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3619
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.16586
TROJ_Generic.DIM Trend Micro Trojan.Sentinel.103
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.13807
TROJ_Generic.DIM Trend Micro Trojan.Sharer.20
TROJ_Generic.DIM Trend Micro Win32.HLLW.Medbod.121
TROJ_Generic.DIM Trend Micro Trojan.Click.2154
TROJ_Generic.DIM Trend Micro Win32.HLLW.MyBot.133
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.3297
TROJ_Generic.DIM Trend Micro Trojan.Inject.902
TROJ_Generic.DIM Trend Micro BackDoor.Bifrost.784
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.18240
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3717
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3721
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.17039
TROJ_Generic.DIM Trend Micro Trojan.Virtumod.585
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.54169
TROJ_Generic.DIM Trend Micro Trojan.Siggen.57682
TROJ_Generic.DIM Trend Micro Trojan.Siggen.57290
TROJ_Generic.DIM Trend Micro Trojan.Siggen.60326
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6145
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6149
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6160
TROJ_Generic.DIM Trend Micro Trojan.Popuper.5966
TROJ_Generic.DIM Trend Micro Trojan.Popuper.8772
TROJ_Generic.DIM Trend Micro Win32.HLLW.Autoruner.1372
TROJ_Generic.DIM Trend Micro Trojan.Popuper.8532
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.10266
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.3898
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.3041
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.31179
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.62905
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.24414
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.57729
TROJ_Generic.DIM Trend Micro Trojan.Siggen.75
TROJ_Generic.DIM Trend Micro Trojan.PWS.LDPinch.7390
TROJ_Generic.DIM Trend Micro Trojan.Siggen.58
TROJ_Generic.DIM Trend Micro Trojan.Siggen.53
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.46651
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.56012
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.59591
TROJ_Generic.DIM Trend Micro BackDoor.Death.27
TROJ_Generic.DIM Trend Micro Trojan.Fakealert.895
TROJ_Generic.DIM Trend Micro Trojan.Siggen.1709
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.28137
TROJ_Generic.DIM Trend Micro Trojan.Mezzia.124

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.