Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIS aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIS Trend Micro Trojan.StartPage.1874
TROJ_Generic.DIS Trend Micro Trojan.Badjoke
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.12603
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.6035
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.9542
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.10930
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.11541
TROJ_Generic.DIS Trend Micro Trojan.Click.16803
TROJ_Generic.DIS Trend Micro Trojan.Click.19304
TROJ_Generic.DIS Trend Micro BackDoor.IRC.Sdbot.3464
TROJ_Generic.DIS Trend Micro BackDoor.IRC.Tiny.19
TROJ_Generic.DIS Trend Micro BackDoor.Poison.807
TROJ_Generic.DIS Trend Micro Trojan.Inject.523
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.11225
TROJ_Generic.DIS Trend Micro Trojan.Inject.1741
TROJ_Generic.DIS Trend Micro Trojan.Inject.3745
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.28026
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.44341
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.1258
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.13763
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.24447
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.15274
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.23338
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.22142
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.24369
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.14139
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.25271
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.15270
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.24352
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.12003
TROJ_Generic.DIS Trend Micro Trojan.PWS.Gamania.11034
TROJ_Generic.DIS Trend Micro Trojan.PWS.Banker.24375
TROJ_Generic.DIS Trend Micro Trojan.PWS.Wsgame.6602
TROJ_Generic.DIS Trend Micro Tool.Netcat
TROJ_Generic.DIS Trend Micro Win32.HLLW.SpyBot
TROJ_Generic.DIS Trend Micro Win32.HLLW.Medbod.117
TROJ_Generic.DIS Trend Micro Win32.HLLW.Medbod.111
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.9113
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.24273
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.4916
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.14569
TROJ_Generic.DIS Trend Micro Trojan.PWS.Tanspy.1326
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.56020
TROJ_Generic.DIS Trend Micro Trojan.Spambot.3086
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.1393
TROJ_Generic.DIS Trend Micro BackDoor.Dgrat.32
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.15719
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.13999
TROJ_Generic.DIS Trend Micro BackDoor.PowerSpider.305
TROJ_Generic.DIS Trend Micro Trojan.PWS.Lineage.4891

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.