Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan-Dropper.Gen aliases:

Name Vendor Dr.Web classification name
Trojan-Dropper.Gen SunBelt Trojan.PWS.Banker.31325
Trojan-Dropper.Gen SunBelt Trojan.Spambot.5069
Trojan-Dropper.Gen SunBelt BackDoor.Poison.1188
Trojan-Dropper.Gen SunBelt Trojan.Packed.669
Trojan-Dropper.Gen SunBelt BackDoor.Tdss.613
Trojan-Dropper.Gen SunBelt Trojan.Packed.16080
Trojan-Dropper.Gen SunBelt Trojan.Ideo.197
Trojan-Dropper.Gen SunBelt Trojan.DownLoad.30389
Trojan-Dropper.Gen SunBelt Trojan.Packed.4040
Trojan-Dropper.Gen SunBelt Trojan.Siggen.5697
Trojan-Dropper.Gen SunBelt BackDoor.Pigeon.41954
Trojan-Dropper.Gen SunBelt Trojan.MulDrop.30263
Trojan-Dropper.Gen SunBelt Trojan.PWS.Spy.633
Trojan-Dropper.Gen SunBelt Trojan.MulDrop.51977
Trojan-Dropper.Gen SunBelt Adware.Cinmus.3334
Trojan-Dropper.Gen SunBelt Trojan.DownLoader1.40282
Trojan-Dropper.Gen SunBelt Trojan.DownLoad.56611
Trojan-Dropper.Gen SunBelt Trojan.Packed.3792
Trojan-Dropper.Gen SunBelt Trojan.DownLoader1.40412
Trojan-Dropper.Gen SunBelt Trojan.Siggen.37499
Trojan-Dropper.Gen SunBelt Trojan.Packed.650
Trojan-Dropper.Gen SunBelt Trojan.MulDrop.36392
Trojan-Dropper.Gen SunBelt Trojan.PWS.Banker.32143
Trojan-Dropper.Gen SunBelt Trojan.Packed.19899
Trojan-Dropper.Gen SunBelt Trojan.PWS.Tibia.1910
Trojan-Dropper.Gen SunBelt Trojan.Packed.655
Trojan-Dropper.Gen SunBelt BackDoor.Pigeon.25466
Trojan-Dropper.Gen SunBelt Trojan.Packed.1386
Trojan-Dropper.Gen SunBelt Win32.HLLW.MyBot.3
Trojan-Dropper.Gen SunBelt Trojan.PWS.LDPinch.4643
Trojan-Dropper.Gen SunBelt Trojan.Siggen.29970
Trojan-Dropper.Gen SunBelt Trojan.Click.28017
Trojan-Dropper.Gen SunBelt Trojan.MulDrop.41220
Trojan-Dropper.Gen SunBelt Trojan.Packed.15835
Trojan-Dropper.Gen SunBelt Trojan.Click.24367
Trojan-Dropper.Gen SunBelt Trojan.MulDrop.11133
Trojan-Dropper.Gen SunBelt Trojan.DownLoad.56571
Trojan-Dropper.Gen SunBelt Trojan.Fakealert.5555
Trojan-Dropper.Gen SunBelt Trojan.Ideo.208
Trojan-Dropper.Gen SunBelt Trojan.PWS.Banker.32174
Trojan-Dropper.Gen SunBelt Trojan.PWS.Banker.32155
Trojan-Dropper.Gen SunBelt BackDoor.Poison.3954
Trojan-Dropper.Gen SunBelt Trojan.Siggen.5690
Trojan-Dropper.Gen SunBelt Trojan.DownLoad1.22302
Trojan-Dropper.Gen SunBelt Trojan.DownLoad.56782
Trojan-Dropper.Gen SunBelt Trojan.Siggen.5434
Trojan-Dropper.Gen SunBelt Trojan.MulDrop.36435
Trojan-Dropper.Gen SunBelt Trojan.AVKill.1578
Trojan-Dropper.Gen SunBelt BackDoor.Bulknet.320
Trojan-Dropper.Gen SunBelt Trojan.DownLoad1.13113

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.