FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PE_INDUC.A aliases:

Name Vendor Dr.Web classification name
PE_INDUC.A Trend Micro Trojan.Dxbot.2
PE_INDUC.A Trend Micro Trojan.Iespy.390
PE_INDUC.A Trend Micro Trojan.DownLoad.39489
PE_INDUC.A Trend Micro BackDoor.Pushnik.5
PE_INDUC.A Trend Micro BackDoor.Pigeon.22359
PE_INDUC.A Trend Micro Trojan.MulDrop.32194
PE_INDUC.A Trend Micro Win32.Induc
PE_INDUC.A Trend Micro Trojan.PWS.Banker.29078
PE_INDUC.A Trend Micro Trojan.DownLoad.40071
PE_INDUC.A Trend Micro Trojan.Winlock.203
PE_INDUC.A Trend Micro BackDoor.Zhen.34
PE_INDUC.A Trend Micro Trojan.StartPage.22404
PE_INDUC.A Trend Micro BackDoor.Pushnik
PE_INDUC.A Trend Micro Trojan.DownLoad.38128
PE_INDUC.A Trend Micro Trojan.DownLoad.43997
PE_INDUC.A Trend Micro Trojan.DownLoad.40146
PE_INDUC.A Trend Micro Trojan.DownLoad.40150
PE_INDUC.A Trend Micro FDOS.IcqFlood.42
PE_INDUC.A Trend Micro Trojan.Siggen.3118
PE_INDUC.A Trend Micro BackDoor.Zhen.22
PE_INDUC.A Trend Micro BackDoor.Zhen.4
PE_INDUC.A Trend Micro BackDoor.Pigeon.22432
PE_INDUC.A Trend Micro Trojan.DownLoad.40138
PE_INDUC.A Trend Micro Trojan.PWS.Multi.57
PE_INDUC.A Trend Micro Win32.HLLW.MyBot
PE_INDUC.A Trend Micro BackDoor.IRC.Sdbot.5127
PE_INDUC.A Trend Micro Trojan.DownLoad.40328
PE_INDUC.A Trend Micro Trojan.PWS.Banker.28509
PE_INDUC.A Trend Micro Trojan.PWS.Banker.28977
PE_INDUC.A Trend Micro BackDoor.Pigeon.22244
PE_INDUC.A Trend Micro Trojan.Iespy.449
PE_INDUC.A Trend Micro BackDoor.Pigeon.origin
PE_INDUC.A Trend Micro BackDoor.Pigeon.22423
PE_INDUC.A Trend Micro Trojan.DownLoad.38127
PE_INDUC.A Trend Micro BackDoor.Zhen.16
PE_INDUC.A Trend Micro BackDoor.Pigeon.22412
PE_INDUC.A Trend Micro BackDoor.Pigeon.22398
PE_INDUC.A Trend Micro BackDoor.Pigeon.23684
PE_INDUC.A Trend Micro Trojan.Commer.24
PE_INDUC.A Trend Micro BackDoor.Pigeon.23655
PE_INDUC.A Trend Micro Trojan.DownLoad.45985
PE_INDUC.A Trend Micro BackDoor.Zhen.17
PE_INDUC.A Trend Micro BackDoor.Pigeon.24221
PE_INDUC.A Trend Micro BackDoor.Pigeon.24211
PE_INDUC.A Trend Micro BackDoor.IRC.Sdbot.4890
PE_INDUC.A Trend Micro Trojan.PWS.Banker.29279
PE_INDUC.A Trend Micro BackDoor.Pushnik.3
PE_INDUC.A Trend Micro Trojan.DownLoad.43088
PE_INDUC.A Trend Micro Trojan.Locker.25
PE_INDUC.A Trend Micro BackDoor.Pigeon.24224

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies