Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TSPY_Generic aliases:

Name Vendor Dr.Web classification name
TSPY_Generic Trend Micro Trojan.Hooker.21007
TSPY_Generic Trend Micro Trojan.Inject.277
TSPY_Generic Trend Micro Trojan.PWS.Lineage
TSPY_Generic Trend Micro Trojan.PWS.Legmir.494
TSPY_Generic Trend Micro Trojan.PWS.Banker.1769
TSPY_Generic Trend Micro Trojan.DownLoader.7661
TSPY_Generic Trend Micro Win32.HLLW.Lockdon
TSPY_Generic Trend Micro Trojan.PWS.Banker.1981
TSPY_Generic Trend Micro Trojan.DownLoader.8249
TSPY_Generic Trend Micro Trojan.PWS.Banker.2042
TSPY_Generic Trend Micro Trojan.DownLoader.8248
TSPY_Generic Trend Micro Trojan.DownLoader.8245
TSPY_Generic Trend Micro BackDoor.Harvester.78
TSPY_Generic Trend Micro Trojan.PWS.Banker.1966
TSPY_Generic Trend Micro Trojan.PWS.Banker.2023
TSPY_Generic Trend Micro Trojan.DownLoader.8246
TSPY_Generic Trend Micro Trojan.PWS.Banker.2020
TSPY_Generic Trend Micro Trojan.PWS.Banker.1996
TSPY_Generic Trend Micro BackDoor.Prosti
TSPY_Generic Trend Micro Trojan.PWS.Hangame
TSPY_Generic Trend Micro Trojan.DownLoader.8506
TSPY_Generic Trend Micro Trojan.PWS.Legmir
TSPY_Generic Trend Micro Trojan.PWS.Banker.2380
TSPY_Generic Trend Micro Trojan.PWS.Banker.2480
TSPY_Generic Trend Micro Trojan.PWS.Banker.2468
TSPY_Generic Trend Micro Trojan.PWS.Banker.2384
TSPY_Generic Trend Micro BackDoor.Uwaga
TSPY_Generic Trend Micro Trojan.MulDrop.3605
TSPY_Generic Trend Micro Trojan.PWS.Banker.2425
TSPY_Generic Trend Micro Trojan.DownLoader.8942
TSPY_Generic Trend Micro Trojan.Proxy.843
TSPY_Generic Trend Micro Trojan.PWS.Banker.2439
TSPY_Generic Trend Micro Trojan.PWS.Banker.2417
TSPY_Generic Trend Micro Trojan.PWS.Mob
TSPY_Generic Trend Micro Trojan.PWS.Banker.2434
TSPY_Generic Trend Micro Trojan.PWS.Banker.2415
TSPY_Generic Trend Micro Trojan.PWS.Legmir.415
TSPY_Generic Trend Micro Trojan.DownLoader.9037
TSPY_Generic Trend Micro Trojan.PWS.MailSnd
TSPY_Generic Trend Micro Trojan.PWS.Legmir.426
TSPY_Generic Trend Micro Trojan.PWS.Qqpass
TSPY_Generic Trend Micro Trojan.Proxy.713
TSPY_Generic Trend Micro BackDoor.Generic.1089
TSPY_Generic Trend Micro Trojan.PWS.Qqshou
TSPY_Generic Trend Micro Trojan.DownLoader.5196
TSPY_Generic Trend Micro Trojan.Phisher
TSPY_Generic Trend Micro Trojan.PWS.Gamania
TSPY_Generic Trend Micro Trojan.Spambot
TSPY_Generic Trend Micro BackDoor.Vpr
TSPY_Generic Trend Micro Trojan.PWS.Banker.1450

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.