Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.PESpin.A aliases:

Name Vendor Dr.Web classification name
Packer.PESpin.A BitDefender Trojan.DownLoader.28728
Packer.PESpin.A BitDefender BackDoor.Zani.139
Packer.PESpin.A BitDefender BackDoor.Zani.131
Packer.PESpin.A BitDefender Trojan.Click.3386
Packer.PESpin.A BitDefender Trojan.Click.3398
Packer.PESpin.A BitDefender BackDoor.Zani.137
Packer.PESpin.A BitDefender Trojan.Click.3409
Packer.PESpin.A BitDefender Trojan.DownLoader.29033
Packer.PESpin.A BitDefender Trojan.Click.3413
Packer.PESpin.A BitDefender Trojan.Click.3401
Packer.PESpin.A BitDefender BackDoor.Zani.147
Packer.PESpin.A BitDefender BackDoor.IRC.Sdbot.1678
Packer.PESpin.A BitDefender Trojan.Mutastik
Packer.PESpin.A BitDefender Trojan.PWS.Banker.10454
Packer.PESpin.A BitDefender Trojan.DownLoader.28730
Packer.PESpin.A BitDefender Trojan.PWS.Banker.10651
Packer.PESpin.A BitDefender BackDoor.Zani.140
Packer.PESpin.A BitDefender BackDoor.Zani.142
Packer.PESpin.A BitDefender Trojan.DownLoader.26883
Packer.PESpin.A BitDefender Trojan.Click.3454
Packer.PESpin.A BitDefender BackDoor.Zani.141
Packer.PESpin.A BitDefender Trojan.Click.3393
Packer.PESpin.A BitDefender BackDoor.Zani.143
Packer.PESpin.A BitDefender BackDoor.Zani.146
Packer.PESpin.A BitDefender Trojan.Click.3414
Packer.PESpin.A BitDefender Trojan.Click.3384
Packer.PESpin.A BitDefender Trojan.Click.3379
Packer.PESpin.A BitDefender Trojan.DownLoader.29614
Packer.PESpin.A BitDefender Trojan.DownLoader.29619
Packer.PESpin.A BitDefender Trojan.DownLoader.29600
Packer.PESpin.A BitDefender Trojan.DownLoader.29618
Packer.PESpin.A BitDefender Trojan.Click.3820
Packer.PESpin.A BitDefender Trojan.Click.3834
Packer.PESpin.A BitDefender Trojan.Click.3717
Packer.PESpin.A BitDefender Trojan.Click.3701
Packer.PESpin.A BitDefender BackDoor.Zani.153
Packer.PESpin.A BitDefender Trojan.Click.3704
Packer.PESpin.A BitDefender Trojan.Click.3757
Packer.PESpin.A BitDefender Trojan.Click.3875
Packer.PESpin.A BitDefender Trojan.Click.3733
Packer.PESpin.A BitDefender BackDoor.Zani.172
Packer.PESpin.A BitDefender Trojan.Click.3900
Packer.PESpin.A BitDefender Trojan.Click.3869
Packer.PESpin.A BitDefender Trojan.Click.3785
Packer.PESpin.A BitDefender Trojan.Click.3773
Packer.PESpin.A BitDefender Trojan.Click.3786
Packer.PESpin.A BitDefender Trojan.Click.3877
Packer.PESpin.A BitDefender Trojan.Click.3902
Packer.PESpin.A BitDefender Trojan.Click.3766
Packer.PESpin.A BitDefender Trojan.Click.3744

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.