Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packed.Win32.CPEX-based.t aliases:

Name Vendor Dr.Web classification name
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.9197
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.3949
Packed.Win32.CPEX-based.t Kaspersky BackDoor.Bifrost.998
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.4167
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.4158
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.3950
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.4168
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.6078
Packed.Win32.CPEX-based.t Kaspersky BackDoor.Pigeon.8284
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.6024
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.12938
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.7487
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.15945
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.8401
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.7825
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.6585
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.6581
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.6151
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.8259
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.7500
Packed.Win32.CPEX-based.t Kaspersky Trojan.Inject.549
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.8817
Packed.Win32.CPEX-based.t Kaspersky BackDoor.Bifrost
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.8354
Packed.Win32.CPEX-based.t Kaspersky Dialer.Adiras
Packed.Win32.CPEX-based.t Kaspersky BackDoor.Bifrost.637
Packed.Win32.CPEX-based.t Kaspersky Trojan.MulDrop.6100
Packed.Win32.CPEX-based.t Kaspersky BackDoor.Torio

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.