Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.Expressor.B aliases:

Name Vendor Dr.Web classification name
Packer.Expressor.B BitDefender BackDoor.Huai.5026
Packer.Expressor.B BitDefender Trojan.MulDrop.18992
Packer.Expressor.B BitDefender BackDoor.Darkshell.66
Packer.Expressor.B BitDefender BackDoor.Pigeon.4351
Packer.Expressor.B BitDefender Trojan.DownLoader.26622
Packer.Expressor.B BitDefender Win32.HLLW.MyBot
Packer.Expressor.B BitDefender BackDoor.Graybird
Packer.Expressor.B BitDefender BackDoor.Pigeon.4375
Packer.Expressor.B BitDefender BackDoor.Pigeon.2254
Packer.Expressor.B BitDefender BackDoor.Pigeon.4365
Packer.Expressor.B BitDefender BackDoor.Pigeon.5295
Packer.Expressor.B BitDefender BackDoor.DMoon.69
Packer.Expressor.B BitDefender BackDoor.Pigeon.5372
Packer.Expressor.B BitDefender BackDoor.Pigeon.5367
Packer.Expressor.B BitDefender BackDoor.Pigeon.5381
Packer.Expressor.B BitDefender BackDoor.Pigeon.5375
Packer.Expressor.B BitDefender BackDoor.Pigeon.5378
Packer.Expressor.B BitDefender BackDoor.Pigeon.5370
Packer.Expressor.B BitDefender BackDoor.Pigeon.5385
Packer.Expressor.B BitDefender BackDoor.Pigeon.5373
Packer.Expressor.B BitDefender Trojan.DownLoader.10963
Packer.Expressor.B BitDefender BackDoor.Pigeon.5368
Packer.Expressor.B BitDefender BackDoor.Pigeon.5374
Packer.Expressor.B BitDefender BackDoor.Pigeon.5369
Packer.Expressor.B BitDefender BackDoor.Pigeon.5377
Packer.Expressor.B BitDefender Trojan.Ideo
Packer.Expressor.B BitDefender BackDoor.Pigeon.5350
Packer.Expressor.B BitDefender BackDoor.Pigeon.5352
Packer.Expressor.B BitDefender BackDoor.DMoon.68
Packer.Expressor.B BitDefender Win32.HLLM.Utenti
Packer.Expressor.B BitDefender Trojan.PWS.Lineage
Packer.Expressor.B BitDefender Trojan.PWS.Qqpass.975
Packer.Expressor.B BitDefender Trojan.PWS.Vipgsm
Packer.Expressor.B BitDefender BackDoor.Cia.28
Packer.Expressor.B BitDefender BackDoor.Pigeon.2584
Packer.Expressor.B BitDefender Trojan.Proxy.1848
Packer.Expressor.B BitDefender Trojan.Elispy
Packer.Expressor.B BitDefender BackDoor.Huai.915
Packer.Expressor.B BitDefender Trojan.MulDrop.16238
Packer.Expressor.B BitDefender BackDoor.Pigeon.8028
Packer.Expressor.B BitDefender BackDoor.Pigeon.2723
Packer.Expressor.B BitDefender Trojan.MulDrop.11135
Packer.Expressor.B BitDefender BackDoor.Huai.2372
Packer.Expressor.B BitDefender Tool.DFind
Packer.Expressor.B BitDefender Trojan.PWS.Banker.13654
Packer.Expressor.B BitDefender BackDoor.Pigeon.11448
Packer.Expressor.B BitDefender BackDoor.Pigeon.3188
Packer.Expressor.B BitDefender BackDoor.Pigeon.1604
Packer.Expressor.B BitDefender BackDoor.ProRat.252
Packer.Expressor.B BitDefender Trojan.DownLoader.12043

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.