Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Tool.Prockill
PAK_Generic.002 Trend Micro Win32.HLLM.Beagle.45056
PAK_Generic.002 Trend Micro Trojan.DownLoader.46800
PAK_Generic.002 Trend Micro Trojan.EES
PAK_Generic.002 Trend Micro Trojan.DownLoader.11591
PAK_Generic.002 Trend Micro BackDoor.Merojan
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.3220
PAK_Generic.002 Trend Micro Trojan.MulDrop.6199
PAK_Generic.002 Trend Micro BackDoor.Portless.113
PAK_Generic.002 Trend Micro Trojan.MulDrop.8506
PAK_Generic.002 Trend Micro BackDoor.Erazer.10
PAK_Generic.002 Trend Micro Tool.HotmailFreez
PAK_Generic.002 Trend Micro Trojan.DownLoader.10664
PAK_Generic.002 Trend Micro BackDoor.Pigeon.8283
PAK_Generic.002 Trend Micro BackDoor.Pigeon.9376
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1941
PAK_Generic.002 Trend Micro Trojan.MulDrop.262
PAK_Generic.002 Trend Micro BackDoor.Huai.2290
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.2923
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.2813
PAK_Generic.002 Trend Micro BackDoor.Beizhu.471
PAK_Generic.002 Trend Micro Trojan.DownLoader.49582
PAK_Generic.002 Trend Micro Trojan.Fakealert.257
PAK_Generic.002 Trend Micro Trojan.Proxy.2159
PAK_Generic.002 Trend Micro Trojan.Naver
PAK_Generic.002 Trend Micro Trojan.DownLoader.51188
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.2646
PAK_Generic.002 Trend Micro Trojan.DownLoader.35433
PAK_Generic.002 Trend Micro BackDoor.Nels
PAK_Generic.002 Trend Micro Trojan.MulDrop.2435
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.389
PAK_Generic.002 Trend Micro Trojan.PWS.Lineage.3423
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir.594
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.2380
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.2301
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.2347
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.2339
PAK_Generic.002 Trend Micro Trojan.Proxy.1344
PAK_Generic.002 Trend Micro Trojan.MulDrop.2535
PAK_Generic.002 Trend Micro Trojan.MulDrop.11171
PAK_Generic.002 Trend Micro Trojan.KeyLogger.205
PAK_Generic.002 Trend Micro BackDoor.Pigeon.11939
PAK_Generic.002 Trend Micro BackDoor.Pigeon.2943
PAK_Generic.002 Trend Micro Trojan.Qqlog
PAK_Generic.002 Trend Micro BackDoor.IRC.Realbot
PAK_Generic.002 Trend Micro BackDoor.Huai.430
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1482
PAK_Generic.002 Trend Micro BackDoor.Huai.2264
PAK_Generic.002 Trend Micro Trojan.PWS.GoldSpy.2166
PAK_Generic.002 Trend Micro Tool.Platen.1

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.