Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packed.PE-Armor aliases:

Name Vendor Dr.Web classification name
Packed.PE-Armor AVG BackDoor.Pigeon.194
Packed.PE-Armor AVG Trojan.PWS.Vipgsm
Packed.PE-Armor AVG BackDoor.Pigeon.12151
Packed.PE-Armor AVG BackDoor.Pigeon.12323
Packed.PE-Armor AVG BackDoor.Pigeon.9168
Packed.PE-Armor AVG Trojan.DownLoader.25993
Packed.PE-Armor AVG Trojan.DownLoader.20785
Packed.PE-Armor AVG Trojan.PWS.Qqshou
Packed.PE-Armor AVG Trojan.DownLoader.19962
Packed.PE-Armor AVG BackDoor.Pigeon.7169
Packed.PE-Armor AVG BackDoor.Huai.1492
Packed.PE-Armor AVG Win32.HLLW.Autoruner.1678
Packed.PE-Armor AVG BackDoor.Pigeon.550
Packed.PE-Armor AVG Trojan.Hooker.256
Packed.PE-Armor AVG BackDoor.Huai.581
Packed.PE-Armor AVG Trojan.DownLoader.40548
Packed.PE-Armor AVG BackDoor.Pigeon.8028
Packed.PE-Armor AVG Trojan.StartPage.21146
Packed.PE-Armor AVG BackDoor.Klj
Packed.PE-Armor AVG Trojan.MulDrop.5848
Packed.PE-Armor AVG BackDoor.Huai.3094
Packed.PE-Armor AVG BackDoor.Huai.2531
Packed.PE-Armor AVG BackDoor.BlackHole.2192
Packed.PE-Armor AVG Trojan.PWS.Fably
Packed.PE-Armor AVG Win32.HLLW.Autoruner.401
Packed.PE-Armor AVG Trojan.Click.19764
Packed.PE-Armor AVG BackDoor.Pigeon.5
Packed.PE-Armor AVG BackDoor.Huai.1153
Packed.PE-Armor AVG BackDoor.Huai.756
Packed.PE-Armor AVG BackDoor.Pigeon.2746
Packed.PE-Armor AVG BackDoor.Pigeon.12419
Packed.PE-Armor AVG BackDoor.Huai.2369
Packed.PE-Armor AVG BackDoor.Pigeon.10342
Packed.PE-Armor AVG BackDoor.Pigeon.8608
Packed.PE-Armor AVG BackDoor.Pigeon.3150
Packed.PE-Armor AVG BackDoor.Pigeon.11882
Packed.PE-Armor AVG Trojan.PWS.Qqpass.1458
Packed.PE-Armor AVG Win32.HLLW.MyBot.based
Packed.PE-Armor AVG Win32.HLLW.Autoruner.791
Packed.PE-Armor AVG Trojan.DownLoader.21763
Packed.PE-Armor AVG BackDoor.Nethief.138
Packed.PE-Armor AVG BackDoor.Pigeon.8100
Packed.PE-Armor AVG DDoS.Bonke
Packed.PE-Armor AVG Trojan.PWS.Lineage.4432
Packed.PE-Armor AVG BackDoor.Pigeon.8195
Packed.PE-Armor AVG BackDoor.Dosia.72
Packed.PE-Armor AVG Trojan.DownLoad.26290
Packed.PE-Armor AVG BackDoor.Pigeon.7304
Packed.PE-Armor AVG BackDoor.IRC.Flood.8
Packed.PE-Armor AVG BackDoor.Pigeon.4433

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.