Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIM aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.23357
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.17613
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.16488
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.16867
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.17261
TROJ_Generic.DIM Trend Micro BackDoor.Iroffer.1446
TROJ_Generic.DIM Trend Micro Trojan.Popuper.5440
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6251
TROJ_Generic.DIM Trend Micro BackDoor.ProRat.256
TROJ_Generic.DIM Trend Micro BackDoor.Bifrost.789
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6383
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.49185
TROJ_Generic.DIM Trend Micro Win32.HLLW.Medbod.97
TROJ_Generic.DIM Trend Micro Win32.HLLW.Medbod.102
TROJ_Generic.DIM Trend Micro Adware.Ykemi.49
TROJ_Generic.DIM Trend Micro Trojan.PWS.Banker.21418
TROJ_Generic.DIM Trend Micro Trojan.PWS.Lineage.4706
TROJ_Generic.DIM Trend Micro Trojan.PWS.Banker.22057
TROJ_Generic.DIM Trend Micro Trojan.Popuper.13388
TROJ_Generic.DIM Trend Micro Adware.Pors.15
TROJ_Generic.DIM Trend Micro Adware.Supa.85
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.29025
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.26894
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.46266
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.60056
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.6281
TROJ_Generic.DIM Trend Micro Trojan.Siggen.1740
TROJ_Generic.DIM Trend Micro BackDoor.Bifrost.825
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.11825
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.17155
TROJ_Generic.DIM Trend Micro Adware.Ykemi.57
TROJ_Generic.DIM Trend Micro Adware.Cinmus.535
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.30068
TROJ_Generic.DIM Trend Micro Trojan.Hitpop.1846
TROJ_Generic.DIM Trend Micro Trojan.Blackmailer.808
TROJ_Generic.DIM Trend Micro Win32.HLLW.MyBot.86
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.7438
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.25927
TROJ_Generic.DIM Trend Micro Adware.Supa.90
TROJ_Generic.DIM Trend Micro Trojan.PWS.Banker.20436
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.10856
TROJ_Generic.DIM Trend Micro Trojan.NtRootKit.904
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.63283
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.64126
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.12724
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.3244
TROJ_Generic.DIM Trend Micro Trojan.Popuper.7297
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6636
TROJ_Generic.DIM Trend Micro Win32.HLLW.Siggen.2
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6224

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.