Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Naix-6 aliases:

Name Vendor Dr.Web classification name
Cryp_Naix-6 Trend Micro Adware.Cinmus
Cryp_Naix-6 Trend Micro Adware.Borlander
Cryp_Naix-6 Trend Micro Adware.Dongtian
Cryp_Naix-6 Trend Micro Adware.Yschttl
Cryp_Naix-6 Trend Micro Trojan.Popwin.608
Cryp_Naix-6 Trend Micro Trojan.Click.3462
Cryp_Naix-6 Trend Micro Trojan.Ugly.29359
Cryp_Naix-6 Trend Micro Trojan.PWS.School
Cryp_Naix-6 Trend Micro Adware.Sogou.61
Cryp_Naix-6 Trend Micro Trojan.MulDrop.928
Cryp_Naix-6 Trend Micro Adware.Cinmus.99
Cryp_Naix-6 Trend Micro Adware.Cinmus.109
Cryp_Naix-6 Trend Micro Adware.Sogou
Cryp_Naix-6 Trend Micro Adware.Cinmus.110
Cryp_Naix-6 Trend Micro Adware.Baidu.263
Cryp_Naix-6 Trend Micro Adware.Cinmus.98
Cryp_Naix-6 Trend Micro Adware.Sogou.60
Cryp_Naix-6 Trend Micro Adware.Baidu.264
Cryp_Naix-6 Trend Micro Adware.Sogou.59
Cryp_Naix-6 Trend Micro Adware.Baidu.262
Cryp_Naix-6 Trend Micro Adware.Cnnew
Cryp_Naix-6 Trend Micro Adware.Videocatch
Cryp_Naix-6 Trend Micro Trojan.Popwin
Cryp_Naix-6 Trend Micro Trojan.DownLoader.18299
Cryp_Naix-6 Trend Micro Trojan.Ugly.29368
Cryp_Naix-6 Trend Micro Trojan.PWS.Gamania.2811
Cryp_Naix-6 Trend Micro Trojan.Popwin.612
Cryp_Naix-6 Trend Micro Trojan.NewPush
Cryp_Naix-6 Trend Micro Trojan.DownLoader.28773
Cryp_Naix-6 Trend Micro Trojan.Ugly.29369
Cryp_Naix-6 Trend Micro Adware.Cinmus.112
Cryp_Naix-6 Trend Micro Adware.Cinmus.108
Cryp_Naix-6 Trend Micro Adware.Cinmus.100
Cryp_Naix-6 Trend Micro Trojan.Ideach
Cryp_Naix-6 Trend Micro Trojan.Ugly.29360
Cryp_Naix-6 Trend Micro Trojan.PWS.Helper.3
Cryp_Naix-6 Trend Micro Dialer.Maxd
Cryp_Naix-6 Trend Micro Trojan.DownLoader.19569
Cryp_Naix-6 Trend Micro Trojan.Click.2076
Cryp_Naix-6 Trend Micro Trojan.Webxman
Cryp_Naix-6 Trend Micro Trojan.Winpop
Cryp_Naix-6 Trend Micro Trojan.Iespy
Cryp_Naix-6 Trend Micro Adware.MySearch
Cryp_Naix-6 Trend Micro Adware.Plugin
Cryp_Naix-6 Trend Micro Adware.Sohu
Cryp_Naix-6 Trend Micro Adware.Ezula
Cryp_Naix-6 Trend Micro Trojan.MulDrop.5789
Cryp_Naix-6 Trend Micro Adware.Zango
Cryp_Naix-6 Trend Micro Adware.Cdn
Cryp_Naix-6 Trend Micro Trojan.MulDrop.6011

1 2 3 4 5 6 7 8 9

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.