Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Trojan.PWS.Gamania.8044
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir.1474
PAK_Generic.002 Trend Micro Trojan.PWS.Goldun
PAK_Generic.002 Trend Micro BackDoor.Pigeon.4892
PAK_Generic.002 Trend Micro BackDoor.Pigeon.7820
PAK_Generic.002 Trend Micro Trojan.Barrio.305
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.1572
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir.145
PAK_Generic.002 Trend Micro BackDoor.Pigeon.669
PAK_Generic.002 Trend Micro BackDoor.Pigeon.7911
PAK_Generic.002 Trend Micro Program.Vskeylogger
PAK_Generic.002 Trend Micro Win32.HLLW.Autoruner.1860
PAK_Generic.002 Trend Micro Trojan.MulDrop.10964
PAK_Generic.002 Trend Micro Trojan.MulDrop.11451
PAK_Generic.002 Trend Micro Trojan.DownLoader.6779
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.22631
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.22632
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.22653
PAK_Generic.002 Trend Micro Trojan.MulDrop.10848
PAK_Generic.002 Trend Micro BackDoor.Mdm
PAK_Generic.002 Trend Micro BackDoor.Plik
PAK_Generic.002 Trend Micro Win32.HLLW.Autoruner
PAK_Generic.002 Trend Micro Win32.HLLM.Beagle
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1337
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1400
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1672
PAK_Generic.002 Trend Micro Trojan.DownLoader.13261
PAK_Generic.002 Trend Micro BackDoor.Wojass
PAK_Generic.002 Trend Micro Trojan.DownLoader.13242
PAK_Generic.002 Trend Micro Trojan.DownLoader.13062
PAK_Generic.002 Trend Micro BackDoor.Bifrost.425
PAK_Generic.002 Trend Micro Trojan.Flashy
PAK_Generic.002 Trend Micro Trojan.Packed.143
PAK_Generic.002 Trend Micro Trojan.DownLoader.51114
PAK_Generic.002 Trend Micro Trojan.DownLoader.30332
PAK_Generic.002 Trend Micro Trojan.MulDrop.2602
PAK_Generic.002 Trend Micro BackDoor.IRC.Sdbot.2225
PAK_Generic.002 Trend Micro BackDoor.Pahac.15
PAK_Generic.002 Trend Micro BackDoor.KgbSpy
PAK_Generic.002 Trend Micro Win32.HLLM.Beagle.9158
PAK_Generic.002 Trend Micro BackDoor.Leviat
PAK_Generic.002 Trend Micro BackDoor.GGhack.21
PAK_Generic.002 Trend Micro BackDoor.Tmrbase.2
PAK_Generic.002 Trend Micro BackDoor.Dax
PAK_Generic.002 Trend Micro Trojan.MulDrop.8206
PAK_Generic.002 Trend Micro Trojan.DownLoader.59212
PAK_Generic.002 Trend Micro Trojan.DownLoader.5972
PAK_Generic.002 Trend Micro Trojan.MulDrop.3192
PAK_Generic.002 Trend Micro Trojan.Linker
PAK_Generic.002 Trend Micro BackDoor.Beizhu.204

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.