Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.PWS.Panda.387 aliases:

Name Vendor Dr.Web classification name
TR/Crypt.XPACK.Gen2 Avira Trojan.PWS.Panda.387
PWS-Zbot.gen.bp McAfee Trojan.PWS.Panda.387
PWS:Win32/Zbot.gen!Y Microsoft Trojan.PWS.Panda.387
HEUR:Trojan.Win32.Generic Kaspersky Trojan.PWS.Panda.387
SScope.Trojan.FakeAV.01110 VirusBlokAda Trojan.PWS.Panda.387
Trojan.Generic.4563527 BitDefender Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.am (v) SunBelt Trojan.PWS.Panda.387
BKDR_SAPIK.A Trend Micro Trojan.PWS.Panda.387
TR/Crypt.XPACK.Gen Avira Trojan.PWS.Panda.387
PWS-Zbot.gen.by McAfee Trojan.PWS.Panda.387
Trojan-Dropper.Win32.Drooptroop.gwp Kaspersky Trojan.PWS.Panda.387
Trojan-Dropper.Win32.Drooptroop.guj VirusBlokAda Trojan.PWS.Panda.387
Trojan.Oficla.AO BitDefender Trojan.PWS.Panda.387
Trojan.Win32.Oficla.ao (v) SunBelt Trojan.PWS.Panda.387
WORM_QAKBOT.SME1 Trend Micro Trojan.PWS.Panda.387
TR/PSW.Zbot.1434 Avira Trojan.PWS.Panda.387
PWS:Win32/Zbot Microsoft Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.atps Kaspersky Trojan.PWS.Panda.387
Trojan.Genome.mfgd VirusBlokAda Trojan.PWS.Panda.387
Trojan.Generic.5151790 BitDefender Trojan.PWS.Panda.387
Trojan.Win32.Generic!SB.0 SunBelt Trojan.PWS.Panda.387
TSPY_ZBOT.SMJA Trend Micro Trojan.PWS.Panda.387
Generic PWS.ti McAfee Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.aqny Kaspersky Trojan.PWS.Panda.387
TrojanSpy.Zbot.aqny VirusBlokAda Trojan.PWS.Panda.387
Gen:Variant.Kazy.1244 BitDefender Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.aag (v) SunBelt Trojan.PWS.Panda.387
TROJ_KRYPTIK.SMK Trend Micro Trojan.PWS.Panda.387
Generic.dx!uvm McAfee Trojan.PWS.Panda.387
TR/Dropper.Gen Avira Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.auad Kaspersky Trojan.PWS.Panda.387
TrojanSpy.Zbot.auad VirusBlokAda Trojan.PWS.Panda.387
Gen:Variant.Kazy.3314 BitDefender Trojan.PWS.Panda.387
Trojan.Win32.Generic.pak!cobra SunBelt Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.axim Kaspersky Trojan.PWS.Panda.387
Gen:Variant.Kazy.1757 BitDefender Trojan.PWS.Panda.387
Trojan.Win32.Generic!BT SunBelt Trojan.PWS.Panda.387
TSPY_ZBOT.SMZY Trend Micro Trojan.PWS.Panda.387
TR/Crypt.ZPACK.Gen2 Avira Trojan.PWS.Panda.387
PWS-Zbot.gen.cc McAfee Trojan.PWS.Panda.387
Trojan:Win32/Bumat!rts Microsoft Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.aqfq Kaspersky Trojan.PWS.Panda.387
TrojanSpy.Zbot.aqfq VirusBlokAda Trojan.PWS.Panda.387
Trojan.Generic.5182805 BitDefender Trojan.PWS.Panda.387
TSPY_ZBOT.SMJT Trend Micro Trojan.PWS.Panda.387
PWS-Spyeye.k McAfee Trojan.PWS.Panda.387
Trojan-Spy.Win32.Zbot.atea Kaspersky Trojan.PWS.Panda.387
Trojan.Zeus.EA.0999 VirusBlokAda Trojan.PWS.Panda.387
Trojan.Generic.5022527 BitDefender Trojan.PWS.Panda.387
Packed.Win32.Zbot.gen.y.8 (v) SunBelt Trojan.PWS.Panda.387

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.