Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Malware-Cryptor.Win32.General.3 aliases:

Name Vendor Dr.Web classification name
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.DownLoad1.41293
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.Snap.302
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Hitbot.2
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.13074
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.Snap.271
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.Snap.268
Malware-Cryptor.Win32.General.3 VirusBlokAda Win32.HLLW.MyBot.4535
Malware-Cryptor.Win32.General.3 VirusBlokAda Win32.HLLW.Rubbish.107
Malware-Cryptor.Win32.General.3 VirusBlokAda Win32.HLLW.MyBot.4150
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.6620
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.550
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.MulDrop.30600
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.3971
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.LDPinch.1322
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.LDPinch.1331
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Popuper.26108
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Popuper.26786
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Popuper.26302
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.13735
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.MulDrop.12006
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.DownLoader.10848
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.MulDrop.18993
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Bulknet.256
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.2732
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.LDPinch.2156
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.10351
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Advload.1
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Advload
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.DownLoad.1031
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Proxy.3211
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Poison.863
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.10398
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.Panda.105
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.MulDrop.9095
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.MulDrop.8173
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.1249
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.9341
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Siggen.2202
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.375
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.LDPinch.2126
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.Snap.399
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.154
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.PWS.LDPinch.1016
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.10410
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.11702
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.2737
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Pigeon.11939
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Spambot.3540
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.IRC.Sdbot.4141
Malware-Cryptor.Win32.General.3 VirusBlokAda Win32.HLLM.Limar.2285

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.