Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_MEW-11 aliases:

Name Vendor Dr.Web classification name
Cryp_MEW-11 Trend Micro BackDoor.Cia.26
Cryp_MEW-11 Trend Micro Trojan.DownLoader.7485
Cryp_MEW-11 Trend Micro Trojan.Proxy.645
Cryp_MEW-11 Trend Micro Trojan.StartPage.1206
Cryp_MEW-11 Trend Micro Trojan.StartPage.1222
Cryp_MEW-11 Trend Micro VirusConstructor.Pterror
Cryp_MEW-11 Trend Micro Trojan.DownLoader.13018
Cryp_MEW-11 Trend Micro Trojan.AVKill.99
Cryp_MEW-11 Trend Micro BackDoor.Insti.40
Cryp_MEW-11 Trend Micro BackDoor.NetCrack.13
Cryp_MEW-11 Trend Micro BackDoor.Xrat.26
Cryp_MEW-11 Trend Micro BackDoor.SubSeven
Cryp_MEW-11 Trend Micro Trojan.DownLoader.17600
Cryp_MEW-11 Trend Micro Trojan.DownLoad.3724
Cryp_MEW-11 Trend Micro BackDoor.IRC.Sdbot.2733
Cryp_MEW-11 Trend Micro BackDoor.HackDef.170
Cryp_MEW-11 Trend Micro Trojan.PWS.Minirat.22
Cryp_MEW-11 Trend Micro Trojan.DownLoader.19499
Cryp_MEW-11 Trend Micro Trojan.KeyLogger.1115
Cryp_MEW-11 Trend Micro Tool.PassView.37
Cryp_MEW-11 Trend Micro Trojan.DownLoader.30027
Cryp_MEW-11 Trend Micro Trojan.DownLoader.29851
Cryp_MEW-11 Trend Micro Trojan.DownLoader.694
Cryp_MEW-11 Trend Micro Trojan.PWS.Egold
Cryp_MEW-11 Trend Micro Trojan.Proxy.2397
Cryp_MEW-11 Trend Micro Trojan.PWS.Edial
Cryp_MEW-11 Trend Micro BackDoor.Tron
Cryp_MEW-11 Trend Micro Trojan.Proxy.1022
Cryp_MEW-11 Trend Micro Trojan.KeyLogger.1431
Cryp_MEW-11 Trend Micro Trojan.PWS.Banker.18805
Cryp_MEW-11 Trend Micro Win32.HLLW.Antinny.43
Cryp_MEW-11 Trend Micro BackDoor.Huai.1750
Cryp_MEW-11 Trend Micro Trojan.MulDrop.6912
Cryp_MEW-11 Trend Micro Trojan.MulDrop.13169
Cryp_MEW-11 Trend Micro BackDoor.IRC.Sdbot.2769
Cryp_MEW-11 Trend Micro BackDoor.IRC.Sdbot.2799
Cryp_MEW-11 Trend Micro Trojan.Redvip
Cryp_MEW-11 Trend Micro Trojan.PWS.Logoner
Cryp_MEW-11 Trend Micro Trojan.Swice.11384
Cryp_MEW-11 Trend Micro BackDoor.Pigeon.12933
Cryp_MEW-11 Trend Micro Win32.HLLW.Asir
Cryp_MEW-11 Trend Micro Trojan.DownLoader.14221
Cryp_MEW-11 Trend Micro Trojan.DownLoader.27458
Cryp_MEW-11 Trend Micro BackDoor.IRC.Shocker
Cryp_MEW-11 Trend Micro Trojan.PWS.LDPinch.3373
Cryp_MEW-11 Trend Micro Trojan.PWS.Qqrobber.296
Cryp_MEW-11 Trend Micro Trojan.PWS.LDPinch.1693
Cryp_MEW-11 Trend Micro BackDoor.Huai.981
Cryp_MEW-11 Trend Micro BackDoor.Rmt
Cryp_MEW-11 Trend Micro BackDoor.Huai.576

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.