Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.PWS.Lich aliases:

Name Vendor Dr.Web classification name
TR/Spy.Gen Avira Trojan.PWS.Lich
VirTool:WinNT/Rootkitdrv!gen.FC Microsoft Trojan.PWS.Lich
Trojan-Downloader.Win32.Small.xaz Kaspersky Trojan.PWS.Lich
Embedded.Rootkit.Win32.Agent.apn VirusBlokAda Trojan.PWS.Lich
TR/Crypt.XPACK.Gen Avira Trojan.PWS.Lich
Trojan:Win32/Chksyn.gen!A Microsoft Trojan.PWS.Lich
Trojan.Win32.Pakes.jwi Kaspersky Trojan.PWS.Lich
Trojan.Win32.Pakes.jwi VirusBlokAda Trojan.PWS.Lich
Trojan.PWS.Lich.A BitDefender Trojan.PWS.Lich
TROJ_PAKES.ATE Trend Micro Trojan.PWS.Lich
Trojan-Dropper.Win32.Agent.smp Kaspersky Trojan.PWS.Lich
Trojan-Dropper.Win32.Agent.sjc VirusBlokAda Trojan.PWS.Lich
Trojan.Generic.324419 BitDefender Trojan.PWS.Lich
Trojan-Dropper.Win32.Agent.sjc Kaspersky Trojan.PWS.Lich
Win32/Chksyn.gen!A Microsoft Trojan.PWS.Lich
Trojan.Win32.Pakes.dbo Kaspersky Trojan.PWS.Lich
Trojan.PWS.Lich VirusBlokAda Trojan.PWS.Lich
Trojan.Win32.Pakes.kao Kaspersky Trojan.PWS.Lich
Rkit/Agent.aiv.1 Avira Trojan.PWS.Lich
Rootkit.Win32.Agent.aiv Kaspersky Trojan.PWS.Lich
Rootkit.Win32.Agent.aiv VirusBlokAda Trojan.PWS.Lich
Trojan.Generic.341157 BitDefender Trojan.PWS.Lich
Trojan.Win32.Agent.qry Kaspersky Trojan.PWS.Lich
Embedded.Rootkit.Win32.Agent.aiv VirusBlokAda Trojan.PWS.Lich
Trojan.Generic.300672 BitDefender Trojan.PWS.Lich
TROJ_AGENT.ASAR Trend Micro Trojan.PWS.Lich
TR/Rootkit.Gen Avira Trojan.PWS.Lich
Generic.dx McAfee Trojan.PWS.Lich
VirTool:WinNT/Rootkitdrv.gen!FL Microsoft Trojan.PWS.Lich
Rootkit.Win32.Agent.ayd Kaspersky Trojan.PWS.Lich
Rootkit.Win32.Agent.ayd VirusBlokAda Trojan.PWS.Lich
Rootkit.4357 BitDefender Trojan.PWS.Lich
Cryp_Xin1 Trend Micro Trojan.PWS.Lich
BDS/Backdoor.Gen Avira Trojan.PWS.Lich
Trojan.Win32.Agent.qry VirusBlokAda Trojan.PWS.Lich
VirTool:WinNT/Rootkitdrv.gen!FC Microsoft Trojan.PWS.Lich
Generic Downloader.x McAfee Trojan.PWS.Lich
Trojan-Downloader.Win32.Small.xaz VirusBlokAda Trojan.PWS.Lich
Generic Dropper McAfee Trojan.PWS.Lich
TR/Vundo.Gen Avira Trojan.PWS.Lich
Generic PWS.y McAfee Trojan.PWS.Lich
Trojan.Rootkit.Agent.NFW BitDefender Trojan.PWS.Lich
Rootkit.2794 BitDefender Trojan.PWS.Lich
TROJ_AGENT.QPK Trend Micro Trojan.PWS.Lich
TROJ_Generic.DIT Trend Micro Trojan.PWS.Lich
Rootkit.Win32.Agent.ccu Kaspersky Trojan.PWS.Lich
Rootkit.1949 BitDefender Trojan.PWS.Lich
Malware-Cryptor.Win32.0074 VirusBlokAda Trojan.PWS.Lich
Rootkit.3153 BitDefender Trojan.PWS.Lich
Trojan.Generic.326064 BitDefender Trojan.PWS.Lich

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.