Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.002 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.002 Trend Micro Trojan.MulDrop.13277
PAK_Generic.002 Trend Micro Trojan.AVKill.245
PAK_Generic.002 Trend Micro Trojan.Starter.175
PAK_Generic.002 Trend Micro Adware.Gator
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.3939
PAK_Generic.002 Trend Micro BackDoor.Holigan
PAK_Generic.002 Trend Micro Trojan.DownLoader.33093
PAK_Generic.002 Trend Micro Dialer.Viro
PAK_Generic.002 Trend Micro Dialer.Accessor
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.9393
PAK_Generic.002 Trend Micro Program.RemoteAdmin.53
PAK_Generic.002 Trend Micro BackDoor.Generic.1029
PAK_Generic.002 Trend Micro Trojan.DownLoader.6923
PAK_Generic.002 Trend Micro BackDoor.Redgirl
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.13843
PAK_Generic.002 Trend Micro BackDoor.Plims
PAK_Generic.002 Trend Micro BackDoor.Pigeon.8152
PAK_Generic.002 Trend Micro Trojan.DownLoader.16150
PAK_Generic.002 Trend Micro BackDoor.Nopy
PAK_Generic.002 Trend Micro BackDoor.King
PAK_Generic.002 Trend Micro BackDoor.Tiny.924
PAK_Generic.002 Trend Micro BackDoor.Huai.2675
PAK_Generic.002 Trend Micro Trojan.Proxy.1836
PAK_Generic.002 Trend Micro Trojan.PWS.Gamania.3988
PAK_Generic.002 Trend Micro BackDoor.Generic.1136
PAK_Generic.002 Trend Micro Trojan.MulDrop.7926
PAK_Generic.002 Trend Micro Trojan.Inject.3245
PAK_Generic.002 Trend Micro Trojan.Proxy.1376
PAK_Generic.002 Trend Micro BackDoor.Pigeon.8336
PAK_Generic.002 Trend Micro BackDoor.IRC.Evil.9
PAK_Generic.002 Trend Micro Trojan.MulDrop.9992
PAK_Generic.002 Trend Micro Trojan.DownLoader.51781
PAK_Generic.002 Trend Micro Trojan.DownLoader.32283
PAK_Generic.002 Trend Micro Trojan.DownLoad.3164
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.6221
PAK_Generic.002 Trend Micro BackDoor.Pigeon.13054
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.8858
PAK_Generic.002 Trend Micro Trojan.PWS.Banker.8485
PAK_Generic.002 Trend Micro Trojan.Click.17801
PAK_Generic.002 Trend Micro Trojan.DownLoader.42586
PAK_Generic.002 Trend Micro Trojan.DownLoader.42564
PAK_Generic.002 Trend Micro Win95.Rinim.480
PAK_Generic.002 Trend Micro Trojan.MulDrop.16333
PAK_Generic.002 Trend Micro BackDoor.Uragan
PAK_Generic.002 Trend Micro BackDoor.Skd.21
PAK_Generic.002 Trend Micro Trojan.PWS.Fakemsn.10
PAK_Generic.002 Trend Micro BackDoor.IRC.Smk
PAK_Generic.002 Trend Micro BackDoor.Shell
PAK_Generic.002 Trend Micro Trojan.PWS.LDPinch.788
PAK_Generic.002 Trend Micro BackDoor.Eurika

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.