Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Win32.HLLM.Beagle.788
PAK_Generic.002 Trend Micro Win32.HLLM.Beagle.795
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.2011
PAK_Generic.002 Trend Micro Trojan.DownLoad.46180
PAK_Generic.002 Trend Micro Trojan.DownLoad.43973
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.41413
PAK_Generic.002 Trend Micro BackDoor.Proxsm.19
PAK_Generic.002 Trend Micro Trojan.DownLoader.28510
PAK_Generic.002 Trend Micro Trojan.Virtumod.557
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.2777
PAK_Generic.002 Trend Micro Trojan.PWS.Siggen.3744
PAK_Generic.002 Trend Micro Trojan.DownLoad.49997
PAK_Generic.002 Trend Micro Win32.HLLW.Autoruner.14773
PAK_Generic.002 Trend Micro Trojan.PWS.Gamania.2799
PAK_Generic.002 Trend Micro BackDoor.Pigeon.4357
PAK_Generic.002 Trend Micro Trojan.Iespy.origin
PAK_Generic.002 Trend Micro Win32.HLLW.Agobot.662
PAK_Generic.002 Trend Micro BackDoor.Proxsm.24
PAK_Generic.002 Trend Micro Trojan.Siggen.219
PAK_Generic.002 Trend Micro Tool.Hucsocks
PAK_Generic.002 Trend Micro Trojan.Click.26096
PAK_Generic.002 Trend Micro BackDoor.Attack.22
PAK_Generic.002 Trend Micro Trojan.Inject.8377
PAK_Generic.002 Trend Micro Trojan.Inject.8381
PAK_Generic.002 Trend Micro Trojan.KillFiles.1804
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1258
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1195
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1179
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1181
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1675
PAK_Generic.002 Trend Micro Win32.HLLM.Siggen.1229
PAK_Generic.002 Trend Micro Trojan.DownLoad.50267
PAK_Generic.002 Trend Micro Trojan.DownLoader.22740
PAK_Generic.002 Trend Micro Trojan.KeyLogger.596
PAK_Generic.002 Trend Micro BackDoor.Pigeon.21733
PAK_Generic.002 Trend Micro Win32.HLLW.Autoruner.1712
PAK_Generic.002 Trend Micro BackDoor.Pigeon.2098
PAK_Generic.002 Trend Micro Program.SystemKey.17
PAK_Generic.002 Trend Micro Trojan.Siggen.3291
PAK_Generic.002 Trend Micro Program.ServUServer.5296
PAK_Generic.002 Trend Micro Program.Monitor.422
PAK_Generic.002 Trend Micro Win32.HLLM.Julio.86
PAK_Generic.002 Trend Micro Trojan.Siggen.60400
PAK_Generic.002 Trend Micro Trojan.Daum.91
PAK_Generic.002 Trend Micro Trojan.Siggen.63624
PAK_Generic.002 Trend Micro Trojan.Siggen.59399
PAK_Generic.002 Trend Micro Trojan.MulDrop.64621
PAK_Generic.002 Trend Micro Trojan.DownLoader1.1386
PAK_Generic.002 Trend Micro BackDoor.Pigeon.1884
PAK_Generic.002 Trend Micro BackDoor.Pigeon.444

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.