Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Trojan.DownLoader.50796
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1499
PAK_Generic.002 Trend Micro Trojan.NtRootKit.205
PAK_Generic.002 Trend Micro Trojan.CDJoke.18436
PAK_Generic.002 Trend Micro Trojan.MulDrop.11537
PAK_Generic.002 Trend Micro Adware.Hotbar
PAK_Generic.002 Trend Micro Trojan.DownLoader.47510
PAK_Generic.002 Trend Micro Trojan.Click.354
PAK_Generic.002 Trend Micro Trojan.DownLoader.29537
PAK_Generic.002 Trend Micro BackDoor.Pigeon.6643
PAK_Generic.002 Trend Micro BackDoor.Pigeon.7204
PAK_Generic.002 Trend Micro Trojan.DownLoader.55156
PAK_Generic.002 Trend Micro Trojan.DownLoader.13875
PAK_Generic.002 Trend Micro Trojan.Takps
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.463
PAK_Generic.002 Trend Micro Trojan.Proxy.415
PAK_Generic.002 Trend Micro BackDoor.Zorro.33
PAK_Generic.002 Trend Micro BackDoor.Zorro.34
PAK_Generic.002 Trend Micro BackDoor.Zorro.35
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1119
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.648
PAK_Generic.002 Trend Micro Trojan.Packed.472
PAK_Generic.002 Trend Micro Trojan.MulDrop.12724
PAK_Generic.002 Trend Micro Win95.CIH.1003
PAK_Generic.002 Trend Micro Win32.HLLM.Beagle.45171
PAK_Generic.002 Trend Micro BackDoor.Salidol
PAK_Generic.002 Trend Micro Trojan.Packed.454
PAK_Generic.002 Trend Micro Trojan.Packed.494
PAK_Generic.002 Trend Micro Win32.HLLW.Autoruner.2013
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.11449
PAK_Generic.002 Trend Micro Trojan.DownLoader.62927
PAK_Generic.002 Trend Micro BackDoor.Generic.797
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.1983
PAK_Generic.002 Trend Micro Trojan.DownLoader.24433
PAK_Generic.002 Trend Micro BackDoor.Undetected.34
PAK_Generic.002 Trend Micro Win32.HLLM.Generic.372
PAK_Generic.002 Trend Micro Win32.HLLM.Generic.399
PAK_Generic.002 Trend Micro Trojan.DownLoader.17642
PAK_Generic.002 Trend Micro Trojan.DownLoader.51669
PAK_Generic.002 Trend Micro BackDoor.Huai.3176
PAK_Generic.002 Trend Micro Joke.FakeFormat
PAK_Generic.002 Trend Micro BackDoor.Swz
PAK_Generic.002 Trend Micro BackDoor.Generic.966
PAK_Generic.002 Trend Micro Trojan.Click.2475
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir.118
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.906
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir.116
PAK_Generic.002 Trend Micro Trojan.PWS.Legmir.134
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.917
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.932

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.