Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Inject.GE aliases:

Name Vendor Dr.Web classification name
Trojan.Inject.GE BitDefender Trojan.DownLoader.35885
Trojan.Inject.GE BitDefender Trojan.Inject.3478
Trojan.Inject.GE BitDefender Trojan.DownLoader.26894
Trojan.Inject.GE BitDefender BackDoor.Poison
Trojan.Inject.GE BitDefender Exploit.DCom.197
Trojan.Inject.GE BitDefender Trojan.DownLoader.37266
Trojan.Inject.GE BitDefender Trojan.MulDrop.11726
Trojan.Inject.GE BitDefender BackDoor.Cia.37
Trojan.Inject.GE BitDefender BackDoor.Poison.40
Trojan.Inject.GE BitDefender Trojan.DownLoader.55514
Trojan.Inject.GE BitDefender BackDoor.DarkMoon.120
Trojan.Inject.GE BitDefender Trojan.DownLoader.47354
Trojan.Inject.GE BitDefender Trojan.MulDrop.17184
Trojan.Inject.GE BitDefender Trojan.DownLoad.20
Trojan.Inject.GE BitDefender Trojan.DownLoader.30260
Trojan.Inject.GE BitDefender Trojan.Razor.2041
Trojan.Inject.GE BitDefender Exploit.DCom.196
Trojan.Inject.GE BitDefender Trojan.KeyLogger.1873
Trojan.Inject.GE BitDefender Trojan.DownLoader.50818
Trojan.Inject.GE BitDefender Trojan.MulDrop.17658
Trojan.Inject.GE BitDefender Trojan.MulDrop.6284
Trojan.Inject.GE BitDefender Trojan.Love
Trojan.Inject.GE BitDefender Trojan.Packed.596
Trojan.Inject.GE BitDefender BackDoor.Poison.1021
Trojan.Inject.GE BitDefender BackDoor.Poison.147
Trojan.Inject.GE BitDefender BackDoor.Poison.347
Trojan.Inject.GE BitDefender BackDoor.Poison.170
Trojan.Inject.GE BitDefender BackDoor.Poison.685
Trojan.Inject.GE BitDefender BackDoor.Poison.61
Trojan.Inject.GE BitDefender Trojan.MulDrop.12716
Trojan.Inject.GE BitDefender BackDoor.Poison.1
Trojan.Inject.GE BitDefender Trojan.DownLoader.51188
Trojan.Inject.GE BitDefender Trojan.MulDrop.11541
Trojan.Inject.GE BitDefender BackDoor.Poison.838
Trojan.Inject.GE BitDefender Trojan.DownLoader.46203
Trojan.Inject.GE BitDefender Trojan.DownLoader1.1792
Trojan.Inject.GE BitDefender Trojan.MulDrop.5770
Trojan.Inject.GE BitDefender Trojan.MulDrop.16480
Trojan.Inject.GE BitDefender Trojan.Proxy.3103
Trojan.Inject.GE BitDefender BackDoor.Poison.743
Trojan.Inject.GE BitDefender Trojan.MulDrop.8427
Trojan.Inject.GE BitDefender Trojan.DownLoad1.43076
Trojan.Inject.GE BitDefender Trojan.DownLoad1.43316
Trojan.Inject.GE BitDefender Trojan.MulDrop.11910
Trojan.Inject.GE BitDefender Trojan.DownLoader.51284
Trojan.Inject.GE BitDefender Trojan.DownLoader.7059
Trojan.Inject.GE BitDefender BackDoor.Poison.686
Trojan.Inject.GE BitDefender BackDoor.Poison.872
Trojan.Inject.GE BitDefender Trojan.Click.45248
Trojan.Inject.GE BitDefender Trojan.PWS.Panda.171

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.