Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.DMS aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.18529
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.28831
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.20349
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.82
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.13623
TROJ_Generic.DMS Trend Micro Trojan.DownLoader.54681
TROJ_Generic.DMS Trend Micro Trojan.DownLoader.35295
TROJ_Generic.DMS Trend Micro Trojan.DownLoader.18978
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.9238
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.8201
TROJ_Generic.DMS Trend Micro Trojan.DownLoad.25613
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.8077
TROJ_Generic.DMS Trend Micro Trojan.Inject.5368
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.8052
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.8054
TROJ_Generic.DMS Trend Micro Trojan.Hitpop.1727
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.8144
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.8133
TROJ_Generic.DMS Trend Micro Trojan.Clb.23
TROJ_Generic.DMS Trend Micro Trojan.Popuper.14496
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.12384
TROJ_Generic.DMS Trend Micro Trojan.PWS.GoldSpy.2272
TROJ_Generic.DMS Trend Micro Trojan.LydraSpy.1295
TROJ_Generic.DMS Trend Micro Trojan.PWS.Legmir.1492
TROJ_Generic.DMS Trend Micro Trojan.Packed.213
TROJ_Generic.DMS Trend Micro BackDoor.Bulknet.223
TROJ_Generic.DMS Trend Micro Trojan.DnsChange.973
TROJ_Generic.DMS Trend Micro BackDoor.Beizhu.1307
TROJ_Generic.DMS Trend Micro BackDoor.Flux.141
TROJ_Generic.DMS Trend Micro BackDoor.Bifrost.491
TROJ_Generic.DMS Trend Micro Trojan.Swizzor.9764
TROJ_Generic.DMS Trend Micro Trojan.PWS.Banker.2516
TROJ_Generic.DMS Trend Micro Trojan.PWS.Banker.11734
TROJ_Generic.DMS Trend Micro Trojan.Siggen.5168
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.15472
TROJ_Generic.DMS Trend Micro Trojan.Virtumod.449
TROJ_Generic.DMS Trend Micro Adware.Supa.13
TROJ_Generic.DMS Trend Micro Trojan.DownLoad.470
TROJ_Generic.DMS Trend Micro Trojan.DownLoader.53192
TROJ_Generic.DMS Trend Micro Trojan.DownLoader.50494
TROJ_Generic.DMS Trend Micro Trojan.DownLoad.25642
TROJ_Generic.DMS Trend Micro Trojan.DownLoad.25906
TROJ_Generic.DMS Trend Micro Trojan.Popwin.798
TROJ_Generic.DMS Trend Micro Adware.Supa.94
TROJ_Generic.DMS Trend Micro Adware.Supa
TROJ_Generic.DMS Trend Micro Trojan.MulDrop.94
TROJ_Generic.DMS Trend Micro Win32.HLLW.Autoruner.5071
TROJ_Generic.DMS Trend Micro Trojan.PWS.Wsgame.2187
TROJ_Generic.DMS Trend Micro Trojan.Click.19362
TROJ_Generic.DMS Trend Micro Trojan.Click.19006

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.