Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_FakeAV aliases:

Name Vendor Dr.Web classification name
Mal_FakeAV Trend Micro Trojan.DownLoader.59802
Mal_FakeAV Trend Micro BackDoor.Pigeon.14967
Mal_FakeAV Trend Micro Trojan.Fakealert
Mal_FakeAV Trend Micro Trojan.Fakealert.3861
Mal_FakeAV Trend Micro Trojan.Fakealert.710
Mal_FakeAV Trend Micro Trojan.PWS.Panda.109
Mal_FakeAV Trend Micro Trojan.PWS.Legmir.2025
Mal_FakeAV Trend Micro Trojan.PWS.Legmir.1559
Mal_FakeAV Trend Micro Win32.HLLW.Autoruner.2640
Mal_FakeAV Trend Micro Trojan.BhoSiggen.6
Mal_FakeAV Trend Micro Trojan.DownLoad.6051
Mal_FakeAV Trend Micro Trojan.DownLoad.30758
Mal_FakeAV Trend Micro Trojan.Fakealert.1179
Mal_FakeAV Trend Micro Trojan.Fakealert.1103
Mal_FakeAV Trend Micro Trojan.DownLoad.12635
Mal_FakeAV Trend Micro Trojan.DownLoad.4036
Mal_FakeAV Trend Micro Trojan.DownLoad.12538
Mal_FakeAV Trend Micro Trojan.PWS.LDPinch.3423
Mal_FakeAV Trend Micro Win32.HLLM.Beagle.218
Mal_FakeAV Trend Micro Trojan.Proxy.2003
Mal_FakeAV Trend Micro Trojan.Fakealert.573
Mal_FakeAV Trend Micro Trojan.Fakealert.702
Mal_FakeAV Trend Micro Trojan.Fakealert.650
Mal_FakeAV Trend Micro Trojan.Fakealert.683
Mal_FakeAV Trend Micro Trojan.Proxy.3211
Mal_FakeAV Trend Micro Trojan.Fakealert.699
Mal_FakeAV Trend Micro Trojan.DownLoader.50054
Mal_FakeAV Trend Micro Trojan.Fakealert.471
Mal_FakeAV Trend Micro Trojan.DownLoader.59806
Mal_FakeAV Trend Micro Trojan.Siggen.105
Mal_FakeAV Trend Micro Trojan.PWS.Wow.708
Mal_FakeAV Trend Micro Trojan.PWS.Wow.710
Mal_FakeAV Trend Micro Trojan.PWS.Wow.670
Mal_FakeAV Trend Micro Trojan.Fakealert.743
Mal_FakeAV Trend Micro BackDoor.Banker.3
Mal_FakeAV Trend Micro Trojan.Fakealert.813
Mal_FakeAV Trend Micro Trojan.Click.19370
Mal_FakeAV Trend Micro Trojan.Fakealert.746
Mal_FakeAV Trend Micro Trojan.Fakealert.740
Mal_FakeAV Trend Micro Trojan.Click.19083
Mal_FakeAV Trend Micro Trojan.MulDrop.15419
Mal_FakeAV Trend Micro Trojan.Fakealert.1092
Mal_FakeAV Trend Micro Trojan.Fakealert.974
Mal_FakeAV Trend Micro Trojan.Proxy.3286
Mal_FakeAV Trend Micro Trojan.Fakealert.975
Mal_FakeAV Trend Micro Trojan.Proxy.1824
Mal_FakeAV Trend Micro Trojan.DownLoad.1177
Mal_FakeAV Trend Micro Trojan.Fakealert.991
Mal_FakeAV Trend Micro Trojan.PWS.LDPinch.2433
Mal_FakeAV Trend Micro Trojan.Fakealert.993

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.