Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packed.AverCrypt aliases:

Name Vendor Dr.Web classification name
Packed.AverCrypt AVG BackDoor.Poison.40
Packed.AverCrypt AVG Trojan.MulDrop.15415
Packed.AverCrypt AVG Trojan.PWS.LDPinch.1130
Packed.AverCrypt AVG Trojan.DownLoader.60974
Packed.AverCrypt AVG BackDoor.Pigeon.9413
Packed.AverCrypt AVG BackDoor.Weedbot.14
Packed.AverCrypt AVG BackDoor.IRC.Sdbot.2665
Packed.AverCrypt AVG BackDoor.IRC.Sdbot.2586
Packed.AverCrypt AVG Trojan.DownLoader.24862
Packed.AverCrypt AVG Trojan.MulDrop.12358
Packed.AverCrypt AVG BackDoor.Pigeon.11515
Packed.AverCrypt AVG Trojan.Proxy.1824
Packed.AverCrypt AVG BackDoor.Iam
Packed.AverCrypt AVG BackDoor.Pigeon.9257
Packed.AverCrypt AVG BackDoor.Pigeon.1815
Packed.AverCrypt AVG BackDoor.Pigeon.7000
Packed.AverCrypt AVG Trojan.Packed.490
Packed.AverCrypt AVG BackDoor.Nuclearat.77
Packed.AverCrypt AVG Trojan.MulDrop.876
Packed.AverCrypt AVG Trojan.DownLoader.50258
Packed.AverCrypt AVG Trojan.Inject.680
Packed.AverCrypt AVG Win32.HLLW.Autoruner.947
Packed.AverCrypt AVG Trojan.Proxy.2003
Packed.AverCrypt AVG BackDoor.Pigeon.1954
Packed.AverCrypt AVG BackDoor.IRC.Sdbot.2485
Packed.AverCrypt AVG Trojan.DownLoader.54335
Packed.AverCrypt AVG BackDoor.Pigeon.3450
Packed.AverCrypt AVG Trojan.DownLoader.50787
Packed.AverCrypt AVG Trojan.DownLoader.49432
Packed.AverCrypt AVG Exploit.Lsass
Packed.AverCrypt AVG BackDoor.Pigeon.12073
Packed.AverCrypt AVG BackDoor.Pigeon.9281
Packed.AverCrypt AVG BackDoor.Pigeon.9351
Packed.AverCrypt AVG BackDoor.Pigeon.12074
Packed.AverCrypt AVG BackDoor.Pigeon.12660
Packed.AverCrypt AVG DDoS.Attack
Packed.AverCrypt AVG Trojan.MulDrop.9762
Packed.AverCrypt AVG Trojan.PWS.KGB
Packed.AverCrypt AVG BackDoor.Pigeon.2225
Packed.AverCrypt AVG BackDoor.Pigeon.3681
Packed.AverCrypt AVG BackDoor.Pigeon.8221
Packed.AverCrypt AVG BackDoor.Pigeon.3707
Packed.AverCrypt AVG BackDoor.Pigeon.3693
Packed.AverCrypt AVG BackDoor.Pigeon.3701
Packed.AverCrypt AVG BackDoor.Pigeon.9256
Packed.AverCrypt AVG BackDoor.Pigeon.9414
Packed.AverCrypt AVG Trojan.PWS.Winlog
Packed.AverCrypt AVG Trojan.DownLoader.837
Packed.AverCrypt AVG BackDoor.IRC.Shabot
Packed.AverCrypt AVG Trojan.PWS.LDPinch.1941

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.