Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Crypt aliases:

Name Vendor Dr.Web classification name
Mal_Crypt Trend Micro BackDoor.Yamu
Mal_Crypt Trend Micro Trojan.Packed.162
Mal_Crypt Trend Micro Trojan.DownLoader.4790
Mal_Crypt Trend Micro Trojan.MulDrop.17023
Mal_Crypt Trend Micro Trojan.Popuper.6416
Mal_Crypt Trend Micro Trojan.DownLoader.26501
Mal_Crypt Trend Micro Trojan.PWS.LDPinch.1130
Mal_Crypt Trend Micro Trojan.DownLoad.14017
Mal_Crypt Trend Micro Trojan.MulDrop.16844
Mal_Crypt Trend Micro BackDoor.NTShell.3
Mal_Crypt Trend Micro Trojan.Inject.3631
Mal_Crypt Trend Micro Trojan.Inject.5089
Mal_Crypt Trend Micro Trojan.Adduser
Mal_Crypt Trend Micro Trojan.PWS.LDPinch.1407
Mal_Crypt Trend Micro Trojan.DownLoader.12354
Mal_Crypt Trend Micro Trojan.PWS.LDPinch.4412
Mal_Crypt Trend Micro Trojan.MulDrop.11817
Mal_Crypt Trend Micro Trojan.MulDrop.8347
Mal_Crypt Trend Micro Trojan.Packed.496
Mal_Crypt Trend Micro DDoS.Attack.56
Mal_Crypt Trend Micro Trojan.PWS.Haiuy.13
Mal_Crypt Trend Micro Trojan.Packed.1197
Mal_Crypt Trend Micro Trojan.Proxy.1999
Mal_Crypt Trend Micro Trojan.MulDrop.8231
Mal_Crypt Trend Micro Trojan.Packed.152
Mal_Crypt Trend Micro Trojan.DownLoader.21472
Mal_Crypt Trend Micro Trojan.DnsChange
Mal_Crypt Trend Micro Trojan.DownLoader.47504
Mal_Crypt Trend Micro Trojan.MulDrop.6267
Mal_Crypt Trend Micro Trojan.PWS.LDPinch.1217
Mal_Crypt Trend Micro Trojan.DownLoader.5401
Mal_Crypt Trend Micro BackDoor.Bifrost.580
Mal_Crypt Trend Micro Trojan.DownLoad1.40799
Mal_Crypt Trend Micro Trojan.MulDrop.2157
Mal_Crypt Trend Micro Trojan.MulDrop.9787
Mal_Crypt Trend Micro Trojan.DownLoader.4785
Mal_Crypt Trend Micro Trojan.MulDrop.605
Mal_Crypt Trend Micro BackDoor.Bifrost.816
Mal_Crypt Trend Micro Trojan.MulDrop.17073
Mal_Crypt Trend Micro Trojan.DownLoader.57191
Mal_Crypt Trend Micro Trojan.PWS.Qqpass.400
Mal_Crypt Trend Micro Trojan.PWS.Gamania.7874
Mal_Crypt Trend Micro Trojan.PWS.LDPinch.1467
Mal_Crypt Trend Micro Tool.Siggen.2308
Mal_Crypt Trend Micro Trojan.DownLoad1.37904
Mal_Crypt Trend Micro Trojan.PWS.Mof
Mal_Crypt Trend Micro BackDoor.Bifrost
Mal_Crypt Trend Micro Trojan.MulDrop.11825
Mal_Crypt Trend Micro Trojan.Packed.471
Mal_Crypt Trend Micro BackDoor.Pigeon.3166

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.