Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Trojan.KeyLogger.5743
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.857
PAK_Generic.002 Trend Micro Trojan.Click.26323
PAK_Generic.002 Trend Micro Win32.HLLO.Black.3
PAK_Generic.002 Trend Micro BackDoor.Proxsm.20
PAK_Generic.002 Trend Micro BackDoor.Beizhu.2377
PAK_Generic.002 Trend Micro Trojan.Siggen.3727
PAK_Generic.002 Trend Micro Trojan.DownLoad.40138
PAK_Generic.002 Trend Micro Trojan.Fakealert.4630
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.214
PAK_Generic.002 Trend Micro Trojan.DownLoad.34654
PAK_Generic.002 Trend Micro BackDoor.Bifrost.11
PAK_Generic.002 Trend Micro Trojan.PWS.Lineage
PAK_Generic.002 Trend Micro Trojan.Fakealert.4395
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1086
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1362
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1355
PAK_Generic.002 Trend Micro Trojan.DownLoad1.41406
PAK_Generic.002 Trend Micro Trojan.DownLoader1.751
PAK_Generic.002 Trend Micro BackDoor.Bandook.13
PAK_Generic.002 Trend Micro Trojan.Fakealert.5367
PAK_Generic.002 Trend Micro BackDoor.Bifrost
PAK_Generic.002 Trend Micro BackDoor.Beizhu.446
PAK_Generic.002 Trend Micro BackDoor.Beizhu.2360
PAK_Generic.002 Trend Micro BackDoor.Huai.4744
PAK_Generic.002 Trend Micro Trojan.DownLoad1.40860
PAK_Generic.002 Trend Micro Trojan.DownLoad1.41575
PAK_Generic.002 Trend Micro Trojan.DownLoad.47207
PAK_Generic.002 Trend Micro Trojan.PWS.Panda.122
PAK_Generic.002 Trend Micro Trojan.Iespy.400
PAK_Generic.002 Trend Micro BackDoor.Bifrost.177
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.30840
PAK_Generic.002 Trend Micro Trojan.Fraudster.58
PAK_Generic.002 Trend Micro Trojan.Fraudster.59
PAK_Generic.002 Trend Micro BackDoor.Pigeon.6210
PAK_Generic.002 Trend Micro Trojan.DownLoader1.861
PAK_Generic.002 Trend Micro Trojan.PWS.Webmonier
PAK_Generic.002 Trend Micro Trojan.DownLoad.46172
PAK_Generic.002 Trend Micro BackDoor.Pigeon.11866
PAK_Generic.002 Trend Micro Trojan.DownLoad.48118
PAK_Generic.002 Trend Micro Trojan.DownLoad.40447
PAK_Generic.002 Trend Micro BackDoor.Proxsm.23
PAK_Generic.002 Trend Micro Trojan.DownLoad1.40729
PAK_Generic.002 Trend Micro Program.RemoteAdmin
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.462
PAK_Generic.002 Trend Micro BackDoor.IRC.Combot
PAK_Generic.002 Trend Micro BackDoor.Pigeon.3447
PAK_Generic.002 Trend Micro Trojan.Proxy.3336
PAK_Generic.002 Trend Micro Trojan.DownLoad.29388
PAK_Generic.002 Trend Micro Trojan.DownLoad.10031

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.