Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.Malware.VPacker.B aliases:

Name Vendor Dr.Web classification name
Packer.Malware.VPacker.B BitDefender BackDoor.Huai
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.4326
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2673
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2649
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2671
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2667
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2670
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2306
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.1604
Packer.Malware.VPacker.B BitDefender BackDoor.Attacker
Packer.Malware.VPacker.B BitDefender BackDoor.Graybird
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.4344
Packer.Malware.VPacker.B BitDefender Trojan.PWS.Maran
Packer.Malware.VPacker.B BitDefender Trojan.DownLoader.4293
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.400
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.4429
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.5310
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.5348
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2841
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.1559
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.2238
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.6173
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.4312
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.11870
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.3439
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.9516
Packer.Malware.VPacker.B BitDefender Trojan.MulDrop.12548
Packer.Malware.VPacker.B BitDefender Trojan.PWS.Vipgsm
Packer.Malware.VPacker.B BitDefender Trojan.MulDrop.11879
Packer.Malware.VPacker.B BitDefender Trojan.MulDrop.7869
Packer.Malware.VPacker.B BitDefender Trojan.DownLoader.20702
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.9695
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.1255
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.3331
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.4744
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.4722
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.82
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.2595
Packer.Malware.VPacker.B BitDefender BackDoor.Pigeon.1643
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.2309
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.2322
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.2326
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.2480
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.2325
Packer.Malware.VPacker.B BitDefender BackDoor.Huai.2593
Packer.Malware.VPacker.B BitDefender Trojan.Starter.175
Packer.Malware.VPacker.B BitDefender BackDoor.Fearless.19
Packer.Malware.VPacker.B BitDefender Trojan.DownLoader.32906
Packer.Malware.VPacker.B BitDefender Trojan.DownLoader.28289
Packer.Malware.VPacker.B BitDefender Adware.MWS

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.