Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Renos-3 aliases:

Name Vendor Dr.Web classification name
Mal_Renos-3 Trend Micro Trojan.Packed.196
Mal_Renos-3 Trend Micro Trojan.Fakealert.2107
Mal_Renos-3 Trend Micro Trojan.Packed.612
Mal_Renos-3 Trend Micro Trojan.PWS.LDPinch.4182
Mal_Renos-3 Trend Micro Trojan.MulDrop.17829
Mal_Renos-3 Trend Micro Trojan.Click.19754
Mal_Renos-3 Trend Micro Trojan.Click.18599
Mal_Renos-3 Trend Micro BackDoor.Tdss.4
Mal_Renos-3 Trend Micro Trojan.DownLoad.35543
Mal_Renos-3 Trend Micro BackDoor.Tdss.5
Mal_Renos-3 Trend Micro Trojan.Fakealert.1071
Mal_Renos-3 Trend Micro Trojan.Click.18046
Mal_Renos-3 Trend Micro Trojan.Fakealert.458
Mal_Renos-3 Trend Micro Trojan.Fakealert.1043
Mal_Renos-3 Trend Micro Trojan.Proxy.3335
Mal_Renos-3 Trend Micro Trojan.Fakealert.1087
Mal_Renos-3 Trend Micro Trojan.DownLoader.50054
Mal_Renos-3 Trend Micro Trojan.Fakealert.1042
Mal_Renos-3 Trend Micro Trojan.Packed.580
Mal_Renos-3 Trend Micro Trojan.Siggen.106
Mal_Renos-3 Trend Micro Trojan.Packed.596
Mal_Renos-3 Trend Micro Trojan.Packed.568
Mal_Renos-3 Trend Micro Trojan.Spambot.3536
Mal_Renos-3 Trend Micro Trojan.DownLoad.3444
Mal_Renos-3 Trend Micro Trojan.Fakealert.1193
Mal_Renos-3 Trend Micro Trojan.Click.20008
Mal_Renos-3 Trend Micro BackDoor.Bulknet.230
Mal_Renos-3 Trend Micro Trojan.Click.18601
Mal_Renos-3 Trend Micro Trojan.Click.18048
Mal_Renos-3 Trend Micro Trojan.MulDrop.14564
Mal_Renos-3 Trend Micro Trojan.Proxy.3211
Mal_Renos-3 Trend Micro Trojan.MulDrop.18267
Mal_Renos-3 Trend Micro Trojan.Click.20378
Mal_Renos-3 Trend Micro Joke.Forgery.161
Mal_Renos-3 Trend Micro Joke.Forgery.166
Mal_Renos-3 Trend Micro Trojan.Fakealert.12732
Mal_Renos-3 Trend Micro Trojan.Fakealert.12634
Mal_Renos-3 Trend Micro Trojan.Fakealert.13448
Mal_Renos-3 Trend Micro Trojan.Click.49467
Mal_Renos-3 Trend Micro Trojan.Shutdown.555
Mal_Renos-3 Trend Micro Trojan.Fakealert.13532
Mal_Renos-3 Trend Micro Trojan.Fakealert.13607
Mal_Renos-3 Trend Micro Trojan.Fakealert.13516
Mal_Renos-3 Trend Micro Trojan.Fakealert.11802
Mal_Renos-3 Trend Micro Trojan.Fakealert.11932
Mal_Renos-3 Trend Micro Trojan.Fakealert.12717
Mal_Renos-3 Trend Micro Trojan.Fakealert.11891
Mal_Renos-3 Trend Micro Trojan.Fakealert.13493
Mal_Renos-3 Trend Micro Trojan.Fakealert.13489
Mal_Renos-3 Trend Micro Trojan.Fakealert.11937

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.