Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIS aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIS Trend Micro Trojan.Popuper.24463
TROJ_Generic.DIS Trend Micro Trojan.Popuper.25524
TROJ_Generic.DIS Trend Micro Trojan.Popuper.26060
TROJ_Generic.DIS Trend Micro Trojan.Popuper.25816
TROJ_Generic.DIS Trend Micro Trojan.Popuper.24808
TROJ_Generic.DIS Trend Micro Trojan.Popuper.24757
TROJ_Generic.DIS Trend Micro Trojan.Popuper.26683
TROJ_Generic.DIS Trend Micro Trojan.Popuper.25323
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.7317
TROJ_Generic.DIS Trend Micro DDoS.Kardraw
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.9786
TROJ_Generic.DIS Trend Micro Trojan.Popuper.7325
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.18328
TROJ_Generic.DIS Trend Micro Constructor.Siggen.821
TROJ_Generic.DIS Trend Micro Win32.HLLM.MyDoom.429
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.61761
TROJ_Generic.DIS Trend Micro Win32.HLLW.Autoruner.14215
TROJ_Generic.DIS Trend Micro Win32.HLLW.Autoruner.15078
TROJ_Generic.DIS Trend Micro Win32.Runonce.6652
TROJ_Generic.DIS Trend Micro Trojan.Spambot.3400
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.61999
TROJ_Generic.DIS Trend Micro BackDoor.Vport.12
TROJ_Generic.DIS Trend Micro Trojan.Hitpop.1858
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.17378
TROJ_Generic.DIS Trend Micro Trojan.PWS.Wsgame.18078
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.42398
TROJ_Generic.DIS Trend Micro Trojan.PWS.Wsgame.17595
TROJ_Generic.DIS Trend Micro Trojan.PWS.Webmonier.262
TROJ_Generic.DIS Trend Micro Trojan.PWS.GoldSpy.3252
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.5924
TROJ_Generic.DIS Trend Micro Trojan.Popuper.14965
TROJ_Generic.DIS Trend Micro Win32.HLLW.Autoruner.15320
TROJ_Generic.DIS Trend Micro Worm.Siggen.796
TROJ_Generic.DIS Trend Micro Worm.Siggen.852
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.24085
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.9434
TROJ_Generic.DIS Trend Micro BackDoor.BlackHole.2380
TROJ_Generic.DIS Trend Micro Win32.HLLW.Agobot.565
TROJ_Generic.DIS Trend Micro Win32.HLLW.Siggen.786
TROJ_Generic.DIS Trend Micro Win32.HLLW.MyBot.3628
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.5886
TROJ_Generic.DIS Trend Micro Win32.HLLW.Autoruner.14848
TROJ_Generic.DIS Trend Micro Win32.HLLW.Autoruner.14563
TROJ_Generic.DIS Trend Micro Win32.HLLW.Autoruner.15094
TROJ_Generic.DIS Trend Micro Win32.HLLW.Autoruner.15438
TROJ_Generic.DIS Trend Micro Trojan.Inject.3570
TROJ_Generic.DIS Trend Micro Trojan.Popuper.6103
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.18361
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.34509
TROJ_Generic.DIS Trend Micro Trojan.Popuper.27423

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.