Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Trojan.Proxy.3766
PAK_Generic.002 Trend Micro Trojan.Juan.84
PAK_Generic.002 Trend Micro Trojan.Virtumod.1643
PAK_Generic.002 Trend Micro Trojan.Siggen.1900
PAK_Generic.002 Trend Micro Trojan.Siggen.1833
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.1311
PAK_Generic.002 Trend Micro Trojan.DownLoad.25675
PAK_Generic.002 Trend Micro Win32.HLLO.Black.8
PAK_Generic.002 Trend Micro Win32.HLLO.Black.9
PAK_Generic.002 Trend Micro BackDoor.Patuh
PAK_Generic.002 Trend Micro Trojan.DownLoad.5989
PAK_Generic.002 Trend Micro Trojan.Fakealert.2175
PAK_Generic.002 Trend Micro Trojan.Siggen.1699
PAK_Generic.002 Trend Micro Trojan.Korwap.271
PAK_Generic.002 Trend Micro Trojan.MulDrop.14610
PAK_Generic.002 Trend Micro BackDoor.Poison.686
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir.135
PAK_Generic.002 Trend Micro Trojan.Siggen.175
PAK_Generic.002 Trend Micro Trojan.MulDrop.20954
PAK_Generic.002 Trend Micro Trojan.MulDrop.21078
PAK_Generic.002 Trend Micro Trojan.IehookSpy.10
PAK_Generic.002 Trend Micro Trojan.MulDrop.27550
PAK_Generic.002 Trend Micro Trojan.PWS.Paguf
PAK_Generic.002 Trend Micro Trojan.Starman
PAK_Generic.002 Trend Micro Trojan.PWS.Hert
PAK_Generic.002 Trend Micro BackDoor.Pigeon.1535
PAK_Generic.002 Trend Micro Trojan.MulDrop.2520
PAK_Generic.002 Trend Micro BackDoor.Pigeon.8689
PAK_Generic.002 Trend Micro BackDoor.Netsnake
PAK_Generic.002 Trend Micro BackDoor.Prodex.129
PAK_Generic.002 Trend Micro Win32.HLLW.Autoruner.1314
PAK_Generic.002 Trend Micro BackDoor.Yanlis
PAK_Generic.002 Trend Micro Trojan.MulDrop.3133
PAK_Generic.002 Trend Micro BackDoor.Rozmowa
PAK_Generic.002 Trend Micro Trojan.StartPage.1098
PAK_Generic.002 Trend Micro Trojan.Click.24871
PAK_Generic.002 Trend Micro Trojan.Inject.4538
PAK_Generic.002 Trend Micro DDoS.Rincux
PAK_Generic.002 Trend Micro BackDoor.Small.51
PAK_Generic.002 Trend Micro BackDoor.Easy.40
PAK_Generic.002 Trend Micro BackDoor.Legon
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.27719
PAK_Generic.002 Trend Micro Trojan.DownLoad.31850
PAK_Generic.002 Trend Micro BackDoor.Xdoor.371
PAK_Generic.002 Trend Micro BackDoor.Beizhu.719
PAK_Generic.002 Trend Micro BackDoor.BlackHole.3141
PAK_Generic.002 Trend Micro Trojan.MulDrop.7126
PAK_Generic.002 Trend Micro BackDoor.Pigeon.11882
PAK_Generic.002 Trend Micro BackDoor.Pigeon.20913
PAK_Generic.002 Trend Micro BackDoor.Pigeon.6173

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.