Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_PESpin aliases:

Name Vendor Dr.Web classification name
Cryp_PESpin Trend Micro Trojan.Click.950
Cryp_PESpin Trend Micro BackDoor.Huai.4744
Cryp_PESpin Trend Micro Trojan.PWS.Banker.9869
Cryp_PESpin Trend Micro Trojan.PWS.Banker.3894
Cryp_PESpin Trend Micro Trojan.PWS.Banker.4221
Cryp_PESpin Trend Micro Trojan.PWS.Banker.3955
Cryp_PESpin Trend Micro Trojan.PWS.Banker.4125
Cryp_PESpin Trend Micro Trojan.PWS.Banker.14106
Cryp_PESpin Trend Micro Trojan.PWS.Banker.13815
Cryp_PESpin Trend Micro Trojan.PWS.Banker.3029
Cryp_PESpin Trend Micro Trojan.DownLoader.7308
Cryp_PESpin Trend Micro Trojan.DownLoader.18714
Cryp_PESpin Trend Micro Tool.Netcat
Cryp_PESpin Trend Micro Trojan.DownLoader.46477
Cryp_PESpin Trend Micro Trojan.DownLoader.55308
Cryp_PESpin Trend Micro Trojan.DownLoader.55731
Cryp_PESpin Trend Micro Trojan.DownLoader.49353
Cryp_PESpin Trend Micro Win32.HLLW.SpyBot.64
Cryp_PESpin Trend Micro Trojan.Click.3896
Cryp_PESpin Trend Micro Trojan.Click.3949
Cryp_PESpin Trend Micro Trojan.Click.3914
Cryp_PESpin Trend Micro Trojan.Click.3901
Cryp_PESpin Trend Micro Trojan.Click.3893
Cryp_PESpin Trend Micro Trojan.Click.3918
Cryp_PESpin Trend Micro Trojan.Click.3900
Cryp_PESpin Trend Micro Trojan.Click.3931
Cryp_PESpin Trend Micro Trojan.Click.3907
Cryp_PESpin Trend Micro Trojan.Click.3888
Cryp_PESpin Trend Micro Trojan.Click.3879
Cryp_PESpin Trend Micro Trojan.Click.3887
Cryp_PESpin Trend Micro Trojan.Click.3935
Cryp_PESpin Trend Micro Trojan.Click.3938
Cryp_PESpin Trend Micro Trojan.Click.3951
Cryp_PESpin Trend Micro Trojan.Click.3905
Cryp_PESpin Trend Micro Trojan.Click.3779
Cryp_PESpin Trend Micro Trojan.Click.3941
Cryp_PESpin Trend Micro Trojan.Click.3946
Cryp_PESpin Trend Micro Trojan.Click.3891
Cryp_PESpin Trend Micro Trojan.Click.3917
Cryp_PESpin Trend Micro Trojan.Click.3892
Cryp_PESpin Trend Micro Trojan.Click.3886
Cryp_PESpin Trend Micro Trojan.Click.3939
Cryp_PESpin Trend Micro Trojan.PWS.Banker.13591
Cryp_PESpin Trend Micro Trojan.PWS.Banker.13715
Cryp_PESpin Trend Micro Trojan.PWS.Banker.13537
Cryp_PESpin Trend Micro Trojan.PWS.Banker.13557
Cryp_PESpin Trend Micro BackDoor.Zani.188
Cryp_PESpin Trend Micro BackDoor.Zani.192
Cryp_PESpin Trend Micro BackDoor.Zani.194
Cryp_PESpin Trend Micro BackDoor.Zani.189

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.