Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.PEArmor.A aliases:

Name Vendor Dr.Web classification name
Packer.PEArmor.A BitDefender BackDoor.Pigeon.2686
Packer.PEArmor.A BitDefender Trojan.DownLoader.7059
Packer.PEArmor.A BitDefender BackDoor.Nethief
Packer.PEArmor.A BitDefender BackDoor.Ncs
Packer.PEArmor.A BitDefender BackDoor.Huai.5814
Packer.PEArmor.A BitDefender Trojan.PWS.Vipgsm
Packer.PEArmor.A BitDefender Trojan.DownLoader.10697
Packer.PEArmor.A BitDefender BackDoor.Pigeon.12771
Packer.PEArmor.A BitDefender BackDoor.BlackHole.2205
Packer.PEArmor.A BitDefender BackDoor.Pigeon.113
Packer.PEArmor.A BitDefender Win32.HLLW.Autoruner.2097
Packer.PEArmor.A BitDefender Win32.HLLW.Autoruner.826
Packer.PEArmor.A BitDefender BackDoor.Pigeon.5102
Packer.PEArmor.A BitDefender BackDoor.Attack.31
Packer.PEArmor.A BitDefender BackDoor.Pigeon.12151
Packer.PEArmor.A BitDefender BackDoor.Pigeon.223
Packer.PEArmor.A BitDefender Trojan.PWS.Qqpass.160
Packer.PEArmor.A BitDefender Trojan.PWS.Banker.13463
Packer.PEArmor.A BitDefender Trojan.DownLoader.48203
Packer.PEArmor.A BitDefender Trojan.DownLoader.19785
Packer.PEArmor.A BitDefender BackDoor.Pigeon.1222
Packer.PEArmor.A BitDefender DDoS.Attack
Packer.PEArmor.A BitDefender BackDoor.Huai.742
Packer.PEArmor.A BitDefender BackDoor.Pigeon.6571
Packer.PEArmor.A BitDefender BackDoor.Pigeon.12323
Packer.PEArmor.A BitDefender BackDoor.Pigeon.8028
Packer.PEArmor.A BitDefender BackDoor.Beizhu.2360
Packer.PEArmor.A BitDefender BackDoor.BlackHole.2015
Packer.PEArmor.A BitDefender BackDoor.Pigeon.8325
Packer.PEArmor.A BitDefender Trojan.MulDrop.10125
Packer.PEArmor.A BitDefender BackDoor.Pigeon.12535
Packer.PEArmor.A BitDefender Trojan.PWS.Qqshou
Packer.PEArmor.A BitDefender BackDoor.Pigeon.11882
Packer.PEArmor.A BitDefender BackDoor.Pigeon.12932
Packer.PEArmor.A BitDefender BackDoor.Beizhu
Packer.PEArmor.A BitDefender Win32.HLLW.MyBot.16
Packer.PEArmor.A BitDefender BackDoor.Pigeon.7767
Packer.PEArmor.A BitDefender Trojan.DownLoader.19962
Packer.PEArmor.A BitDefender BackDoor.Pigeon.7169
Packer.PEArmor.A BitDefender BackDoor.Pigeon.5317
Packer.PEArmor.A BitDefender Trojan.MulDrop.5418
Packer.PEArmor.A BitDefender BackDoor.Huai.1492
Packer.PEArmor.A BitDefender BackDoor.Beizhu.550
Packer.PEArmor.A BitDefender Win32.HLLW.Autoruner.1678
Packer.PEArmor.A BitDefender BackDoor.Pigeon.5300
Packer.PEArmor.A BitDefender BackDoor.Pigeon.4433
Packer.PEArmor.A BitDefender Trojan.Hooker.256
Packer.PEArmor.A BitDefender Win32.HLLW.Autoruner.1267
Packer.PEArmor.A BitDefender BackDoor.Pigeon.252
Packer.PEArmor.A BitDefender BackDoor.Pigeon.3035

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.