Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Trojan.DownLoader.63192
PAK_Generic.002 Trend Micro Trojan.DownLoader.23730
PAK_Generic.002 Trend Micro BackDoor.Iroffer.13
PAK_Generic.002 Trend Micro Trojan.Inject.1981
PAK_Generic.002 Trend Micro BackDoor.Vaster.11
PAK_Generic.002 Trend Micro BackDoor.Xboot.35
PAK_Generic.002 Trend Micro BackDoor.Thief.20
PAK_Generic.002 Trend Micro Trojan.DownLoader.341
PAK_Generic.002 Trend Micro Trojan.DownLoader.36483
PAK_Generic.002 Trend Micro Trojan.Bazooka
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir
PAK_Generic.002 Trend Micro BackDoor.Ninja
PAK_Generic.002 Trend Micro Tool.Hdsi
PAK_Generic.002 Trend Micro Trojan.DownLoader.15104
PAK_Generic.002 Trend Micro Trojan.DownLoader.21680
PAK_Generic.002 Trend Micro Trojan.DownLoader.62849
PAK_Generic.002 Trend Micro Trojan.MulDrop.6170
PAK_Generic.002 Trend Micro Trojan.MulDrop.10339
PAK_Generic.002 Trend Micro Trojan.MulDrop.9319
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.2146
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1973
PAK_Generic.002 Trend Micro Trojan.MulDrop.5371
PAK_Generic.002 Trend Micro BackDoor.Pigeon.2620
PAK_Generic.002 Trend Micro BackDoor.ProRat.197
PAK_Generic.002 Trend Micro Trojan.MulDrop.12068
PAK_Generic.002 Trend Micro Trojan.PWS.MailSnd
PAK_Generic.002 Trend Micro Trojan.DownLoader.6741
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.12818
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.2047
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.881
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.887
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.864
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.14538
PAK_Generic.002 Trend Micro BackDoor.Generic.1013
PAK_Generic.002 Trend Micro BackDoor.Generic.678
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.3559
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.21051
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.20366
PAK_Generic.002 Trend Micro BackDoor.Huai.742
PAK_Generic.002 Trend Micro Trojan.Fakemsn
PAK_Generic.002 Trend Micro BackDoor.Shina
PAK_Generic.002 Trend Micro Trojan.MulDrop.3944
PAK_Generic.002 Trend Micro Trojan.MulDrop.7435
PAK_Generic.002 Trend Micro BackDoor.Pigeon.8442
PAK_Generic.002 Trend Micro Trojan.DownLoader.3935
PAK_Generic.002 Trend Micro DDoS.MegaNuke
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.400
PAK_Generic.002 Trend Micro Trojan.StartPage.1099
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.569
PAK_Generic.002 Trend Micro BackDoor.Brat

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.