Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_RONTKBR.GEN aliases:

Name Vendor Dr.Web classification name
WORM_RONTKBR.GEN Trend Micro BackDoor.Generic.1138
WORM_RONTKBR.GEN Trend Micro Win32.HLLM.Jowo
WORM_RONTKBR.GEN Trend Micro Win32.HLLM.Brontok
WORM_RONTKBR.GEN Trend Micro BackDoor.Generic.1274
WORM_RONTKBR.GEN Trend Micro Win32.HLLW.Generic.188
WORM_RONTKBR.GEN Trend Micro Trojan.Blakhal.4
WORM_RONTKBR.GEN Trend Micro Win32.HLLW.Brontok
WORM_RONTKBR.GEN Trend Micro BackDoor.Dtr.142
WORM_RONTKBR.GEN Trend Micro Trojan.MulDrop.3212
WORM_RONTKBR.GEN Trend Micro Trojan.Microjo.17
WORM_RONTKBR.GEN Trend Micro Trojan.DownLoader.7376
WORM_RONTKBR.GEN Trend Micro Trojan.Proxy.444
WORM_RONTKBR.GEN Trend Micro BackDoor.Pyev
WORM_RONTKBR.GEN Trend Micro Trojan.PWS.LDPinch.1889
WORM_RONTKBR.GEN Trend Micro Win32.HLLM.Generic.402
WORM_RONTKBR.GEN Trend Micro Trojan.DownLoader.8175
WORM_RONTKBR.GEN Trend Micro Trojan.PWS.LDPinch.863
WORM_RONTKBR.GEN Trend Micro Trojan.DownLoader.3974
WORM_RONTKBR.GEN Trend Micro Win32.HLLW.Generic.185
WORM_RONTKBR.GEN Trend Micro BackDoor.Generic.1317
WORM_RONTKBR.GEN Trend Micro Win32.Virut.5
WORM_RONTKBR.GEN Trend Micro Trojan.DownLoader.20641
WORM_RONTKBR.GEN Trend Micro Trojan.DownLoader.28289
WORM_RONTKBR.GEN Trend Micro Trojan.PWS.LDPinch.3320
WORM_RONTKBR.GEN Trend Micro Trojan.Siggen.61608
WORM_RONTKBR.GEN Trend Micro Trojan.PWS.Siggen.3576
WORM_RONTKBR.GEN Trend Micro Trojan.PWS.Siggen.3139
WORM_RONTKBR.GEN Trend Micro Trojan.Click.47320
WORM_RONTKBR.GEN Trend Micro Trojan.Siggen.27042
WORM_RONTKBR.GEN Trend Micro Trojan.Click.28879

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.