Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.F01 aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.F01 Trend Micro Trojan.Lenovo
TROJ_Generic.F01 Trend Micro Trojan.PWS.Siggen.57
TROJ_Generic.F01 Trend Micro Trojan.Click.4770
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.9675
TROJ_Generic.F01 Trend Micro Program.ServUServer.60
TROJ_Generic.F01 Trend Micro Trojan.DownLoad.3849
TROJ_Generic.F01 Trend Micro Trojan.DownLoad.25901
TROJ_Generic.F01 Trend Micro Trojan.DownLoad.1070
TROJ_Generic.F01 Trend Micro Trojan.DownLoader.62487
TROJ_Generic.F01 Trend Micro Trojan.DownLoader.36456
TROJ_Generic.F01 Trend Micro Trojan.Inject.4633
TROJ_Generic.F01 Trend Micro BackDoor.Pigeon.21851
TROJ_Generic.F01 Trend Micro BackDoor.Hbeat.146
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.15073
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.18143
TROJ_Generic.F01 Trend Micro Trojan.Warring
TROJ_Generic.F01 Trend Micro Trojan.DownLoad1.39674
TROJ_Generic.F01 Trend Micro BackDoor.BlackHole.2075
TROJ_Generic.F01 Trend Micro BackDoor.Heartbeat.13
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.18848
TROJ_Generic.F01 Trend Micro Trojan.PWS.Qqpass.4211
TROJ_Generic.F01 Trend Micro Trojan.PWS.Wow.1729
TROJ_Generic.F01 Trend Micro BackDoor.Goth.74
TROJ_Generic.F01 Trend Micro BackDoor.Klj.25
TROJ_Generic.F01 Trend Micro Trojan.DownLoad.6035
TROJ_Generic.F01 Trend Micro BackDoor.Rpcs
TROJ_Generic.F01 Trend Micro Trojan.PWS.Qqpass.1541
TROJ_Generic.F01 Trend Micro Trojan.Packed.365
TROJ_Generic.F01 Trend Micro Win32.HLLO.Black.32
TROJ_Generic.F01 Trend Micro Trojan.NtRootKit.1652
TROJ_Generic.F01 Trend Micro Trojan.Fakealert.13370
TROJ_Generic.F01 Trend Micro Trojan.DownLoad1.41363
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.19981
TROJ_Generic.F01 Trend Micro Trojan.Inject.549
TROJ_Generic.F01 Trend Micro Trojan.Click.24061
TROJ_Generic.F01 Trend Micro Trojan.DownLoader.58312
TROJ_Generic.F01 Trend Micro Trojan.DownLoader.62670
TROJ_Generic.F01 Trend Micro BackDoor.Pigeon.2486
TROJ_Generic.F01 Trend Micro Trojan.Inject.5347
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.17443
TROJ_Generic.F01 Trend Micro Trojan.Inject.3858
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.18255
TROJ_Generic.F01 Trend Micro Trojan.Virtumod.512
TROJ_Generic.F01 Trend Micro Trojan.Blackmailer.337
TROJ_Generic.F01 Trend Micro Trojan.MulDrop.15961
TROJ_Generic.F01 Trend Micro Trojan.PWS.Banker.22894
TROJ_Generic.F01 Trend Micro Trojan.PWS.MSNPass.48
TROJ_Generic.F01 Trend Micro Trojan.PWS.Ibank.7
TROJ_Generic.F01 Trend Micro Trojan.Starter.450
TROJ_Generic.F01 Trend Micro Win32.HLLW.Autoruner.877

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.