Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.Pohernah.C aliases:

Name Vendor Dr.Web classification name
Packer.Pohernah.C BitDefender Trojan.Packed.516
Packer.Pohernah.C BitDefender BackDoor.Poison.40
Packer.Pohernah.C BitDefender BackDoor.Pigeon.4332
Packer.Pohernah.C BitDefender BackDoor.Beizhu.331
Packer.Pohernah.C BitDefender Trojan.PWS.LDPinch.1130
Packer.Pohernah.C BitDefender Trojan.DownLoader.60974
Packer.Pohernah.C BitDefender BackDoor.Pigeon.9413
Packer.Pohernah.C BitDefender BackDoor.Weedbot.14
Packer.Pohernah.C BitDefender Trojan.Inject.3365
Packer.Pohernah.C BitDefender BackDoor.IRC.Sdbot.2586
Packer.Pohernah.C BitDefender Trojan.DownLoader.24862
Packer.Pohernah.C BitDefender Trojan.MulDrop.12358
Packer.Pohernah.C BitDefender Trojan.MulDrop.14026
Packer.Pohernah.C BitDefender Trojan.Proxy.1824
Packer.Pohernah.C BitDefender BackDoor.Iam
Packer.Pohernah.C BitDefender BackDoor.Pigeon.1815
Packer.Pohernah.C BitDefender BackDoor.Pigeon.7000
Packer.Pohernah.C BitDefender Trojan.PWS.LDPinch.3167
Packer.Pohernah.C BitDefender Trojan.Packed.490
Packer.Pohernah.C BitDefender Trojan.PWS.LDPinch.1941
Packer.Pohernah.C BitDefender Win32.HLLW.Flooder.2
Packer.Pohernah.C BitDefender Trojan.Luzya
Packer.Pohernah.C BitDefender BackDoor.Nuclearat.77
Packer.Pohernah.C BitDefender Trojan.MulDrop.876
Packer.Pohernah.C BitDefender Trojan.PWS.Gamania.9762
Packer.Pohernah.C BitDefender Trojan.DownLoader.50258
Packer.Pohernah.C BitDefender Trojan.Inject.680
Packer.Pohernah.C BitDefender Win32.HLLW.Autoruner.947
Packer.Pohernah.C BitDefender Win32.IRC.Bot
Packer.Pohernah.C BitDefender BackDoor.Pigeon.1954
Packer.Pohernah.C BitDefender Trojan.PWS.LDPinch.1407
Packer.Pohernah.C BitDefender BackDoor.IRC.Sdbot.2485
Packer.Pohernah.C BitDefender Trojan.Packed.453
Packer.Pohernah.C BitDefender Trojan.DownLoader.54335
Packer.Pohernah.C BitDefender Trojan.PWS.LDPinch.1417
Packer.Pohernah.C BitDefender Win32.HLLW.Booti
Packer.Pohernah.C BitDefender BackDoor.Pigeon.3450
Packer.Pohernah.C BitDefender Trojan.DownLoader.50787
Packer.Pohernah.C BitDefender Trojan.DownLoader.49432
Packer.Pohernah.C BitDefender Exploit.Lsass
Packer.Pohernah.C BitDefender Trojan.DownLoader.59462
Packer.Pohernah.C BitDefender BackDoor.Pigeon.7196
Packer.Pohernah.C BitDefender BackDoor.Pigeon.12073
Packer.Pohernah.C BitDefender Trojan.MulDrop.12166
Packer.Pohernah.C BitDefender BackDoor.Pigeon.9281
Packer.Pohernah.C BitDefender Trojan.DownLoader.46203
Packer.Pohernah.C BitDefender BackDoor.Pigeon.9351
Packer.Pohernah.C BitDefender BackDoor.Pigeon.12074
Packer.Pohernah.C BitDefender BackDoor.Pigeon.12660
Packer.Pohernah.C BitDefender BackDoor.Optix.153

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.