Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro BackDoor.Beizhu.902
PAK_Generic.002 Trend Micro BackDoor.Pigeon.412
PAK_Generic.002 Trend Micro BackDoor.Pigeon.9517
PAK_Generic.002 Trend Micro Trojan.PWS.Qqpass.1103
PAK_Generic.002 Trend Micro BackDoor.Pigeon.8759
PAK_Generic.002 Trend Micro Trojan.DownLoader.49870
PAK_Generic.002 Trend Micro Trojan.DownLoader.6160
PAK_Generic.002 Trend Micro Program.ServUServer.5206
PAK_Generic.002 Trend Micro Trojan.DownLoader.45927
PAK_Generic.002 Trend Micro Trojan.Proxy.913
PAK_Generic.002 Trend Micro Trojan.Proxy.921
PAK_Generic.002 Trend Micro Trojan.Proxy.907
PAK_Generic.002 Trend Micro Trojan.Proxy.914
PAK_Generic.002 Trend Micro Trojan.Proxy.910
PAK_Generic.002 Trend Micro Trojan.Proxy.908
PAK_Generic.002 Trend Micro Trojan.Proxy.912
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.20155
PAK_Generic.002 Trend Micro Trojan.Proxy.906
PAK_Generic.002 Trend Micro Trojan.Proxy.917
PAK_Generic.002 Trend Micro VirusConstructor.Psyme.2
PAK_Generic.002 Trend Micro Tool.AntiFrost
PAK_Generic.002 Trend Micro Trojan.MulDrop.6989
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.6433
PAK_Generic.002 Trend Micro Trojan.MulDrop.4864
PAK_Generic.002 Trend Micro Trojan.PWS.Vkoy
PAK_Generic.002 Trend Micro BackDoor.IRC.Botty
PAK_Generic.002 Trend Micro Trojan.Click.17949
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.3535
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.1065
PAK_Generic.002 Trend Micro BackDoor.Phime
PAK_Generic.002 Trend Micro BackDoor.Pigeon.5025
PAK_Generic.002 Trend Micro BackDoor.Beizhu.1083
PAK_Generic.002 Trend Micro BackDoor.Asv
PAK_Generic.002 Trend Micro Trojan.PWS.Ayo
PAK_Generic.002 Trend Micro Trojan.Proxy.449
PAK_Generic.002 Trend Micro BackDoor.Motiv.12
PAK_Generic.002 Trend Micro Trojan.DownLoader.3273
PAK_Generic.002 Trend Micro Trojan.KeyLogger.568
PAK_Generic.002 Trend Micro BackDoor.Update.55
PAK_Generic.002 Trend Micro Trojan.DownLoader.21070
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1262
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1271
PAK_Generic.002 Trend Micro Flooder.Mytag
PAK_Generic.002 Trend Micro BackDoor.Pigeon.157
PAK_Generic.002 Trend Micro BackDoor.Pigeon.6329
PAK_Generic.002 Trend Micro Trojan.DownLoader.1603
PAK_Generic.002 Trend Micro Trojan.DownLoader.1604
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.1428
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.1435
PAK_Generic.002 Trend Micro BackDoor.Pigeon.11870

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.