Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIM aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIM Trend Micro Trojan.Virtumod.543
TROJ_Generic.DIM Trend Micro Trojan.Plastix
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.10974
TROJ_Generic.DIM Trend Micro Trojan.KeyLogger.1260
TROJ_Generic.DIM Trend Micro Win32.HLLW.Autoruner.2634
TROJ_Generic.DIM Trend Micro Tool.Gina.1
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.47396
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.61633
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.59689
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.59715
TROJ_Generic.DIM Trend Micro BackDoor.BlackHole.2496
TROJ_Generic.DIM Trend Micro BackDoor.Latinus.32
TROJ_Generic.DIM Trend Micro Trojan.Siggen.564
TROJ_Generic.DIM Trend Micro BackDoor.Bulknet.256
TROJ_Generic.DIM Trend Micro Trojan.PWS.Banker.10524
TROJ_Generic.DIM Trend Micro BackDoor.BotNet.31
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6398
TROJ_Generic.DIM Trend Micro BackDoor.Beizhu.1116
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6414
TROJ_Generic.DIM Trend Micro BackDoor.Finish
TROJ_Generic.DIM Trend Micro Trojan.WinKill.18
TROJ_Generic.DIM Trend Micro BackDoor.Iroffer.1447
TROJ_Generic.DIM Trend Micro BackDoor.Iam
TROJ_Generic.DIM Trend Micro BackDoor.Bulknet.182
TROJ_Generic.DIM Trend Micro Trojan.Popuper.5448
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.15191
TROJ_Generic.DIM Trend Micro Trojan.PWS.Banker.20059
TROJ_Generic.DIM Trend Micro Adware.BusMedia.137
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.13098
TROJ_Generic.DIM Trend Micro Trojan.Inject.3349
TROJ_Generic.DIM Trend Micro BackDoor.Generic.1258
TROJ_Generic.DIM Trend Micro Trojan.ZGet.5120
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.1886
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.6060
TROJ_Generic.DIM Trend Micro Adware.Websearch
TROJ_Generic.DIM Trend Micro Adware.Nopage
TROJ_Generic.DIM Trend Micro Trojan.PWS.Wow.731
TROJ_Generic.DIM Trend Micro Trojan.PWS.Sable
TROJ_Generic.DIM Trend Micro Trojan.PWS.Wow.692
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.20009
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.7435
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.12525
TROJ_Generic.DIM Trend Micro Trojan.PWS.Gamania.16858
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.39690
TROJ_Generic.DIM Trend Micro Trojan.Popuper.6931
TROJ_Generic.DIM Trend Micro Trojan.MulDrop.20978
TROJ_Generic.DIM Trend Micro Trojan.DownLoader.53183
TROJ_Generic.DIM Trend Micro Trojan.Proxy.3293
TROJ_Generic.DIM Trend Micro Trojan.DownLoad.1146
TROJ_Generic.DIM Trend Micro Trojan.Inject.3474

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.