Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.RZ3077 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.RZ3077 Trend Micro BackDoor.IRC.Sdbot.4924
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.20159
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen1.6304
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.40232
TROJ_Gen.RZ3077 Trend Micro BackDoor.SWCall
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen1.5359
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.24603
TROJ_Gen.RZ3077 Trend Micro BackDoor.Sys64
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.162
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.10995
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Panda.30
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.origin
TROJ_Gen.RZ3077 Trend Micro BackDoor.WebDor
TROJ_Gen.RZ3077 Trend Micro BackDoor.IRC.Wisdom
TROJ_Gen.RZ3077 Trend Micro BackDoor.Beizhu.2245
TROJ_Gen.RZ3077 Trend Micro Trojan.Hosts.91
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.49847
TROJ_Gen.RZ3077 Trend Micro Trojan.KeyLogger.2222
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Banker.26987
TROJ_Gen.RZ3077 Trend Micro Trojan.Virtumod.448
TROJ_Gen.RZ3077 Trend Micro Trojan.Botnetlog.11
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.26455
TROJ_Gen.RZ3077 Trend Micro DDoS.Storm.31
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.359
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.25507
TROJ_Gen.RZ3077 Trend Micro Trojan.Fakealert.458
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.24030
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.31926
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.46203
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Multi.36
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Panda.111
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.53284
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.64031
TROJ_Gen.RZ3077 Trend Micro Adware.MediaMotor.294
TROJ_Gen.RZ3077 Trend Micro Trojan.Jshx.10
TROJ_Gen.RZ3077 Trend Micro Win32.Virut.5
TROJ_Gen.RZ3077 Trend Micro Trojan.Fakealert
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.Autoruner.848
TROJ_Gen.RZ3077 Trend Micro Trojan.KeyLogger.2053
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Banker.9345
TROJ_Gen.RZ3077 Trend Micro Dialer.Inst
TROJ_Gen.RZ3077 Trend Micro BackDoor.Bifrost.24
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad1.37704
TROJ_Gen.RZ3077 Trend Micro Trojan.Virtumod.based.12
TROJ_Gen.RZ3077 Trend Micro Win32.HLLM.Generic.41
TROJ_Gen.RZ3077 Trend Micro BackDoor.Beizhu.2487
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.34639
TROJ_Gen.RZ3077 Trend Micro BackDoor.Poison.1021
TROJ_Gen.RZ3077 Trend Micro Trojan.Packed.412
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoader.53482

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.