Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.Pohernah.A aliases:

Name Vendor Dr.Web classification name
Packer.Pohernah.A BitDefender BackDoor.BlackHole.2127
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1407
Packer.Pohernah.A BitDefender Trojan.DownLoader.20168
Packer.Pohernah.A BitDefender BackDoor.Beizhu.808
Packer.Pohernah.A BitDefender Trojan.DownLoader.35885
Packer.Pohernah.A BitDefender Trojan.PWS.Gamania.6962
Packer.Pohernah.A BitDefender Trojan.MulDrop.17449
Packer.Pohernah.A BitDefender BackDoor.Pigeon.13074
Packer.Pohernah.A BitDefender Trojan.KeyLogger.719
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1417
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1738
Packer.Pohernah.A BitDefender Trojan.MulDrop.5419
Packer.Pohernah.A BitDefender BackDoor.Pigeon.12433
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2121
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2098
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2105
Packer.Pohernah.A BitDefender BackDoor.BotNet.49
Packer.Pohernah.A BitDefender Trojan.MulDrop.15085
Packer.Pohernah.A BitDefender BackDoor.BlackHole.2101
Packer.Pohernah.A BitDefender Trojan.KeyLogger.1334
Packer.Pohernah.A BitDefender Trojan.DownLoader.51127
Packer.Pohernah.A BitDefender Trojan.AVKill.388
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.3272
Packer.Pohernah.A BitDefender Trojan.Reboot
Packer.Pohernah.A BitDefender BackDoor.Pigeon.9695
Packer.Pohernah.A BitDefender Trojan.MulDrop.9507
Packer.Pohernah.A BitDefender Trojan.Rawlam
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.3363
Packer.Pohernah.A BitDefender BackDoor.Pigeon.10962
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1650
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.3638
Packer.Pohernah.A BitDefender Trojan.Packed.152
Packer.Pohernah.A BitDefender Trojan.MulDrop.16877
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2093
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2111
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2089
Packer.Pohernah.A BitDefender Win32.HLLM.Beagle.9728
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2244
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2091
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2086
Packer.Pohernah.A BitDefender Trojan.Proxy.2003
Packer.Pohernah.A BitDefender Trojan.MulDrop.94
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2729
Packer.Pohernah.A BitDefender Trojan.DownLoader.59462
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.2297
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1654
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1656
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1655
Packer.Pohernah.A BitDefender BackDoor.Pixbot
Packer.Pohernah.A BitDefender Trojan.PWS.LDPinch.1710

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.