Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DIS aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DIS Trend Micro Trojan.Hosts.12
TROJ_Generic.DIS Trend Micro Trojan.Click.19393
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.3251
TROJ_Generic.DIS Trend Micro BackDoor.Huai.2720
TROJ_Generic.DIS Trend Micro Trojan.Swizzor
TROJ_Generic.DIS Trend Micro Trojan.Swizzor.10712
TROJ_Generic.DIS Trend Micro Trojan.Okuks.based
TROJ_Generic.DIS Trend Micro Trojan.Svish
TROJ_Generic.DIS Trend Micro Trojan.Okuks.38
TROJ_Generic.DIS Trend Micro Trojan.Virtumod.based.12
TROJ_Generic.DIS Trend Micro Trojan.Click.18161
TROJ_Generic.DIS Trend Micro Trojan.Click.19205
TROJ_Generic.DIS Trend Micro Trojan.Virtumod.based.17
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.14026
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.6207
TROJ_Generic.DIS Trend Micro Trojan.Packed.650
TROJ_Generic.DIS Trend Micro Trojan.Packed.511
TROJ_Generic.DIS Trend Micro Trojan.Packed.158
TROJ_Generic.DIS Trend Micro Trojan.Fakealert.1041
TROJ_Generic.DIS Trend Micro Trojan.Kedr
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.18529
TROJ_Generic.DIS Trend Micro Trojan.Packed.453
TROJ_Generic.DIS Trend Micro Adware.Winad
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.47171
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.63554
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.62905
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.57005
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.56883
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.36802
TROJ_Generic.DIS Trend Micro Trojan.KeyLogger.2331
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.27516
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.21028
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.37319
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.2254
TROJ_Generic.DIS Trend Micro BackDoor.Iam
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.6972
TROJ_Generic.DIS Trend Micro BackDoor.Pigeon.9671
TROJ_Generic.DIS Trend Micro Trojan.MulDrop.28262
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.63559
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.59734
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.62852
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.63600
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.21075
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.24002
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.50219
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.59765
TROJ_Generic.DIS Trend Micro Trojan.DownLoader.64134
TROJ_Generic.DIS Trend Micro BackDoor.Siggen.246
TROJ_Generic.DIS Trend Micro Trojan.Spambot.3478
TROJ_Generic.DIS Trend Micro Trojan.DownLoad.355

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.