Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIM aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIM Trend Micro Trojan.Fakealert.811
TROJ_Generic.DIM Trend Micro Trojan.Fakealert.742
TROJ_Generic.DIM Trend Micro Trojan.Fakealert.738
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.63483
TROJ_Generic.DIM Trend Micro DDoS.Bonke
TROJ_Generic.DIM Trend Micro Trojan.Spambot.3378
TROJ_Generic.DIM Trend Micro Trojan.Spambot.3480
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.17713
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.7032
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.16876
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.18143
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.28828
TROJ_Generic.DIM Trend Micro Trojan.PWS.Wsgame.4294
TROJ_Generic.DIM Trend Micro BackDoor.Minirem
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.21102
TROJ_Generic.DIM Trend Micro BackDoor.Beizhu.337
TROJ_Generic.DIM Trend Micro BackDoor.Graybird.3
TROJ_Generic.DIM Trend Micro Trojan.PWS.MSNSpy.206
TROJ_Generic.DIM Trend Micro Trojan.PWS.Wsgame.8154
TROJ_Generic.DIM Trend Micro Trojan.PWS.Tanspy.1338
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.63384
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.63346
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.15523
TROJ_Generic.DIM Trend Micro Trojan.Spambot.3374
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.16468
TROJ_Generic.DIM Trend Micro BackDoor.Bifrost.1158
TROJ_Generic.DIM Trend Micro Win32.HLLM.Beagle.45180
TROJ_Generic.DIM Trend Micro BackDoor.Pigeon.22765
TROJ_Generic.DIM Trend Micro BackDoor.Pigeon.10299
TROJ_Generic.DIM Trend Micro Trojan.NtRootKit.1167
TROJ_Generic.DIM Trend Micro Trojan.PWS.GoldSpy.2164
TROJ_Generic.DIM Trend Micro Trojan.PWS.Wsgame.11034
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.3668
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.3541
TROJ_Generic.DIM Trend Micro BackDoor.IRC.Sdbot.3452
TROJ_Generic.DIM Trend Micro Trojan.Skintrim.15
TROJ_Generic.DIM Trend Micro Trojan.Hitpop.1081
TROJ_Generic.DIM Trend Micro Trojan.Hitpop.1387
TROJ_Generic.DIM Trend Micro BackDoor.Pigeon.23047
TROJ_Generic.DIM Trend Micro Trojan.Hitpop.288
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.17167
TROJ_Generic.DIM Trend Micro Trojan.Havedo.587
TROJ_Generic.DIM Trend Micro Trojan.KeyLogger.669
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.18429
TROJ_Generic.DIM Trend Micro Trojan.Rent.14
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.945
TROJ_Generic.DIM Trend Micro Trojan.Packed.472
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.15018
TROJ_Generic.DIM Trend Micro Trojan.Hitpop.183
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.16873

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.