Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Malware-Cryptor.Grygoryi.3 aliases:

Name Vendor Dr.Web classification name
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Fakealert.19413
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Fakealert.15985
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Fakealert.16245
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.36169
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Fakealert.13237
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Packed.20312
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.32965
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoad2.18032
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.31610
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.40621
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.37748
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.28144
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Siggen2.6824
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.32581
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Siggen.64544
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.35685
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Packed.18626
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.39782
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.33632
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.MulDrop1.15267
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoad2.9882
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.39786
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Siggen1.61712
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Siggen1.63802
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoad1.64217
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.31769
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.36843
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.39833
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.38073
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.22680
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoad1.64195
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.33925
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoad2.12471
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.33918
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.38983
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.14244
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.35603
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.35832
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.39697
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.32210
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.MulDrop1.52311
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.40165
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Siggen1.61713
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Siggen2.7554
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.32339
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.39982
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.MulDrop1.54674
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Inject.14834
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.Fakealert.18541
Malware-Cryptor.Grygoryi.3 VirusBlokAda Trojan.DownLoader1.32399

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.