Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.RZ3077 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.20805
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.SpyBot.15
TROJ_Gen.RZ3077 Trend Micro Trojan.Inject.5685
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.3061
TROJ_Gen.RZ3077 Trend Micro BackDoor.IRC.Sdbot.927
TROJ_Gen.RZ3077 Trend Micro Adware.Virtumonde
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.19754
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.28020
TROJ_Gen.RZ3077 Trend Micro Trojan.Spambot.4434
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.33534
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.45018
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.42305
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Banker.29633
TROJ_Gen.RZ3077 Trend Micro Trojan.Swizzor.11181
TROJ_Gen.RZ3077 Trend Micro Trojan.Swizzor.11030
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Panda.5
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.31904
TROJ_Gen.RZ3077 Trend Micro Trojan.KeyLogger.2419
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.39008
TROJ_Gen.RZ3077 Trend Micro Trojan.KillFiles.942
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.23267
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.18785
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.60062
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Gamania.7878
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.574
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.35706
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.22078
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.Autoruner.4360
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.8301
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.32004
TROJ_Gen.RZ3077 Trend Micro Trojan.Popuper.6951
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.Autoruner.6649
TROJ_Gen.RZ3077 Trend Micro BackDoor.Oscar
TROJ_Gen.RZ3077 Trend Micro Trojan.Fakealert.4156
TROJ_Gen.RZ3077 Trend Micro Trojan.Swizzor.11129
TROJ_Gen.RZ3077 Trend Micro Trojan.Winlock.66
TROJ_Gen.RZ3077 Trend Micro Trojan.Inject.3631
TROJ_Gen.RZ3077 Trend Micro BackDoor.Bifrost
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.3358
TROJ_Gen.RZ3077 Trend Micro BackDoor.Tdss.84
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.6173
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.13619
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.MyBot
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.158
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.314
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.35939
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.45017
TROJ_Gen.RZ3077 Trend Micro Trojan.Mycentria.59
TROJ_Gen.RZ3077 Trend Micro Trojan.Popuper.15313
TROJ_Gen.RZ3077 Trend Micro BackDoor.Firdem

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.