Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PAK_Generic.005 aliases:

Name Vendor Dr.Web classification name
PAK_Generic.005 Trend Micro BackDoor.Assasin.26
PAK_Generic.005 Trend Micro Trojan.Botnetlog.3
PAK_Generic.005 Trend Micro BackDoor.Dllka
PAK_Generic.005 Trend Micro Trojan.PWS.Qqmail
PAK_Generic.005 Trend Micro Win32.Daum.1
PAK_Generic.005 Trend Micro Trojan.KeyLogger.3524
PAK_Generic.005 Trend Micro Trojan.MulDrop.32045
PAK_Generic.005 Trend Micro Trojan.MulDrop.1267
PAK_Generic.005 Trend Micro BackDoor.Pigeon.9137
PAK_Generic.005 Trend Micro Trojan.Jupiter
PAK_Generic.005 Trend Micro Trojan.MulDrop.32033
PAK_Generic.005 Trend Micro Trojan.MulDrop.10212
PAK_Generic.005 Trend Micro Trojan.MulDrop.12152
PAK_Generic.005 Trend Micro Trojan.MulDrop.12358
PAK_Generic.005 Trend Micro Trojan.PWS.Qqrobber.33
PAK_Generic.005 Trend Micro Trojan.Proxy.680
PAK_Generic.005 Trend Micro BackDoor.IRC.Tiny
PAK_Generic.005 Trend Micro Trojan.DownLoader.8025
PAK_Generic.005 Trend Micro Trojan.Proxy.644
PAK_Generic.005 Trend Micro Trojan.DownLoader.50300
PAK_Generic.005 Trend Micro Tool.Wsockhook
PAK_Generic.005 Trend Micro BackDoor.IRC.Rusbot
PAK_Generic.005 Trend Micro BackDoor.IRC.Sdbot.1350
PAK_Generic.005 Trend Micro Trojan.PWS.Ansky
PAK_Generic.005 Trend Micro Win32.HLLW.Balyz
PAK_Generic.005 Trend Micro BackDoor.Beast.207
PAK_Generic.005 Trend Micro Trojan.DownLoader.3692
PAK_Generic.005 Trend Micro Trojan.DownLoader.30051
PAK_Generic.005 Trend Micro BackDoor.BlackHole.origin
PAK_Generic.005 Trend Micro BackDoor.Update.30
PAK_Generic.005 Trend Micro BackDoor.Bifrost.491
PAK_Generic.005 Trend Micro Trojan.DownLoader.7912
PAK_Generic.005 Trend Micro Trojan.DownLoader.15463
PAK_Generic.005 Trend Micro Trojan.DownLoader.37561
PAK_Generic.005 Trend Micro Trojan.DownLoader.50891
PAK_Generic.005 Trend Micro BackDoor.IRC.Sdbot.2870
PAK_Generic.005 Trend Micro Trojan.PWS.Gamania.11554
PAK_Generic.005 Trend Micro Trojan.PWS.Gamania.11588
PAK_Generic.005 Trend Micro Trojan.PWS.Gamania.11623
PAK_Generic.005 Trend Micro Trojan.PWS.Gamania.11569
PAK_Generic.005 Trend Micro Trojan.Inject.3601
PAK_Generic.005 Trend Micro Trojan.HackKit
PAK_Generic.005 Trend Micro Trojan.Liubei
PAK_Generic.005 Trend Micro Trojan.Inject.444
PAK_Generic.005 Trend Micro Trojan.DownLoader.27697
PAK_Generic.005 Trend Micro Trojan.PWS.GWGhost.61
PAK_Generic.005 Trend Micro Adware.MegaSearch
PAK_Generic.005 Trend Micro Trojan.MulDrop.15082
PAK_Generic.005 Trend Micro BackDoor.Goth.11
PAK_Generic.005 Trend Micro Trojan.DownLoader.30563

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.