Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.RZ3077 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.RZ3077 Trend Micro BackDoor.Beizhu.2440
TROJ_Gen.RZ3077 Trend Micro BackDoor.Poison.686
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.32243
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.33841
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Banker.27478
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Gamania
TROJ_Gen.RZ3077 Trend Micro Trojan.Mutastik
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.24665
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.46087
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Panda.31
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Panda.9
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.27702
TROJ_Gen.RZ3077 Trend Micro BackDoor.Bifrost.35
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.15196
TROJ_Gen.RZ3077 Trend Micro BackDoor.Cool
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.3359
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Tibia.306
TROJ_Gen.RZ3077 Trend Micro BackDoor.Fyd.2
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.21851
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.35735
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.MyBot.30
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.LDPinch.3548
TROJ_Gen.RZ3077 Trend Micro Trojan.DnsChange.973
TROJ_Gen.RZ3077 Trend Micro Trojan.KillFiles.940
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.31446
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.600
TROJ_Gen.RZ3077 Trend Micro Trojan.Ring
TROJ_Gen.RZ3077 Trend Micro Trojan.Fakealert.684
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.29451
TROJ_Gen.RZ3077 Trend Micro Trojan.Micro.10
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.25760
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.38250
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Banker.28678
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.31402
TROJ_Gen.RZ3077 Trend Micro Program.Vskeylogger
TROJ_Gen.RZ3077 Trend Micro Trojan.Spambot.4424
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.GoldSpy.2719
TROJ_Gen.RZ3077 Trend Micro Trojan.Swizzor.11199
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Wsgame.11158
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.3199
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.22799
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.650
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Mob
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.35459
TROJ_Gen.RZ3077 Trend Micro Trojan.Winlock.55
TROJ_Gen.RZ3077 Trend Micro BackDoor.Bifrost.41
TROJ_Gen.RZ3077 Trend Micro Exploit.DCom.146
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Qqpass.2066
TROJ_Gen.RZ3077 Trend Micro Tool.Transmit.3
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.MyBot.45

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.