Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Gen.RZ3077 aliases:

Name Vendor Dr.Web classification name
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.Autoruner.6326
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.24220
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.6037
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.29405
TROJ_Gen.RZ3077 Trend Micro Win32.HLLM.Beagle.305
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.SpyBot.14
TROJ_Gen.RZ3077 Trend Micro BackDoor.Bifrost.1738
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.32812
TROJ_Gen.RZ3077 Trend Micro Trojan.NtRootKit.3605
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad1.4854
TROJ_Gen.RZ3077 Trend Micro Trojan.Proxy.6345
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.11286
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.56623
TROJ_Gen.RZ3077 Trend Micro BackDoor.Poison.1168
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.36291
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.31288
TROJ_Gen.RZ3077 Trend Micro Trojan.Rent.14
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad1.231
TROJ_Gen.RZ3077 Trend Micro Adware.Siggen.936
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.5567
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Siggen.1619
TROJ_Gen.RZ3077 Trend Micro BackDoor.Pigeon.26056
TROJ_Gen.RZ3077 Trend Micro Worm.Siggen.301
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.8302
TROJ_Gen.RZ3077 Trend Micro Trojan.KeyLogger.3792
TROJ_Gen.RZ3077 Trend Micro Trojan.Fakealert.7774
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.5927
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.64747
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.57919
TROJ_Gen.RZ3077 Trend Micro BackDoor.Bifrost.1572
TROJ_Gen.RZ3077 Trend Micro Win32.HLLW.Autoruner.8470
TROJ_Gen.RZ3077 Trend Micro BackDoor.IRC.Sdbot.6663
TROJ_Gen.RZ3077 Trend Micro Trojan.MulDrop.47277
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.13256
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Spy.202
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.51720
TROJ_Gen.RZ3077 Trend Micro Trojan.Proxy.6371
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.51398
TROJ_Gen.RZ3077 Trend Micro Trojan.Proxy.17263
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Banker.31299
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.26874
TROJ_Gen.RZ3077 Trend Micro Exploit.PDF.1505
TROJ_Gen.RZ3077 Trend Micro Trojan.Qhost.400
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.6072
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.16307
TROJ_Gen.RZ3077 Trend Micro Trojan.Click.33936
TROJ_Gen.RZ3077 Trend Micro Trojan.Siggen.29520
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.Tibia.351
TROJ_Gen.RZ3077 Trend Micro Trojan.DownLoad.52478
TROJ_Gen.RZ3077 Trend Micro Trojan.PWS.GoldSpy.2894

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.