Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Neb-2 aliases:

Name Vendor Dr.Web classification name
Cryp_Neb-2 Trend Micro Trojan.DownLoader.11391
Cryp_Neb-2 Trend Micro BackDoor.IRC.Sdbot
Cryp_Neb-2 Trend Micro Trojan.PWS.Qqrobber.425
Cryp_Neb-2 Trend Micro Trojan.Mssmsgs.628
Cryp_Neb-2 Trend Micro BackDoor.Poison.713
Cryp_Neb-2 Trend Micro BackDoor.Poison.712
Cryp_Neb-2 Trend Micro Trojan.PWS.Qqrobber.427
Cryp_Neb-2 Trend Micro Trojan.PWS.Qqrobber.429
Cryp_Neb-2 Trend Micro BackDoor.Poison.709
Cryp_Neb-2 Trend Micro Trojan.Inject.origin
Cryp_Neb-2 Trend Micro Trojan.Inject.5146
Cryp_Neb-2 Trend Micro Trojan.Inject.5089
Cryp_Neb-2 Trend Micro BackDoor.Poison.686
Cryp_Neb-2 Trend Micro BackDoor.FireOn
Cryp_Neb-2 Trend Micro BackDoor.FireOn.3
Cryp_Neb-2 Trend Micro BackDoor.FireOn.6
Cryp_Neb-2 Trend Micro Trojan.Coresun.2
Cryp_Neb-2 Trend Micro Trojan.MulDrop.origin
Cryp_Neb-2 Trend Micro Win32.HLLW.Brutus.4642
Cryp_Neb-2 Trend Micro Trojan.MulDrop.14968
Cryp_Neb-2 Trend Micro Trojan.DownLoader.63177
Cryp_Neb-2 Trend Micro Trojan.MulDrop.14969
Cryp_Neb-2 Trend Micro Trojan.DownLoader.62939
Cryp_Neb-2 Trend Micro Trojan.MulDrop.17841
Cryp_Neb-2 Trend Micro Trojan.Virtumod.12
Cryp_Neb-2 Trend Micro BackDoor.Poison.807
Cryp_Neb-2 Trend Micro Trojan.DownLoad.25607
Cryp_Neb-2 Trend Micro BackDoor.Poison.60
Cryp_Neb-2 Trend Micro Trojan.MulDrop.31657
Cryp_Neb-2 Trend Micro Trojan.DownLoad.6063
Cryp_Neb-2 Trend Micro Trojan.DownLoad.4884
Cryp_Neb-2 Trend Micro Trojan.Inject.3730
Cryp_Neb-2 Trend Micro Trojan.DownLoad.3479
Cryp_Neb-2 Trend Micro Trojan.Popuper.7689
Cryp_Neb-2 Trend Micro Trojan.Popuper.7696
Cryp_Neb-2 Trend Micro BackDoor.Poison.718
Cryp_Neb-2 Trend Micro Trojan.Mssmsgs.576
Cryp_Neb-2 Trend Micro BackDoor.Poison.61
Cryp_Neb-2 Trend Micro Win32.HLLW.Autoruner.2494
Cryp_Neb-2 Trend Micro Trojan.MulDrop.31710
Cryp_Neb-2 Trend Micro Trojan.Inject.3716
Cryp_Neb-2 Trend Micro Trojan.Inject.3856
Cryp_Neb-2 Trend Micro Trojan.MulDrop.19497
Cryp_Neb-2 Trend Micro Trojan.MulDrop.20924
Cryp_Neb-2 Trend Micro Trojan.Mssmsgs.577
Cryp_Neb-2 Trend Micro Trojan.Mssmsgs.578
Cryp_Neb-2 Trend Micro Trojan.MulDrop.31751
Cryp_Neb-2 Trend Micro Trojan.DownLoad.38106
Cryp_Neb-2 Trend Micro BackDoor.IRC.Flood.8
Cryp_Neb-2 Trend Micro Trojan.MulDrop.31827

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.