Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.Malware.VPacker.A aliases:

Name Vendor Dr.Web classification name
Packer.Malware.VPacker.A BitDefender BackDoor.Bandito.17
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.4424
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.4411
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.5421
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.5371
Packer.Malware.VPacker.A BitDefender Trojan.DownLoader.29725
Packer.Malware.VPacker.A BitDefender Trojan.Inject.365
Packer.Malware.VPacker.A BitDefender BackDoor.Penumbra
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.3205
Packer.Malware.VPacker.A BitDefender Trojan.DownLoader.21835
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.11604
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.2168
Packer.Malware.VPacker.A BitDefender BackDoor.IRC.Sdbot.1881
Packer.Malware.VPacker.A BitDefender Trojan.DownLoader.35888
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.8769
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.5295
Packer.Malware.VPacker.A BitDefender Trojan.PWS.Capture
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.4988
Packer.Malware.VPacker.A BitDefender BackDoor.IRC.Sdbot.2876
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.1289
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.6792
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.797
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.7350
Packer.Malware.VPacker.A BitDefender BackDoor.Huai.484
Packer.Malware.VPacker.A BitDefender BackDoor.Gina
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.11218
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.4974
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.6643
Packer.Malware.VPacker.A BitDefender Win32.HLLW.Autoruner.1639
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.8423
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.3142
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.12933
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.113
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.669
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.11870
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.10844
Packer.Malware.VPacker.A BitDefender Trojan.MulDrop.9620
Packer.Malware.VPacker.A BitDefender BackDoor.Huai.2504
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.8746
Packer.Malware.VPacker.A BitDefender Trojan.PWS.Qqpass.746
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.3267
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.11706
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.6374
Packer.Malware.VPacker.A BitDefender Trojan.KeyLogger.1620
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.5733
Packer.Malware.VPacker.A BitDefender BackDoor.WebDor
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.2651
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.3983
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.6620
Packer.Malware.VPacker.A BitDefender BackDoor.Pigeon.8306

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.