Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Malware-Cryptor.Win32.HZ4.12 aliases:

Name Vendor Dr.Web classification name
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Packed.196
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.DownLoad.15174
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.WebDL.2
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Siggen.106
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.PWS.Runbox
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Dumaru.3
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Dumaru.6
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Dumaru.8
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Win32.HLLM.Dumaru
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Click.18048
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Click.19754
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Win32.Redemption.9216
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.KillDisk.291
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.IRC.Air.2560
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Asylum.12
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Ill.4608
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Dumaru
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Asylum.13
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Fakealert.12187
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.DownLoader.6359
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Psychward.2
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.KeyLogger.76
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Win32.Teddy
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Click.18601
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Fakealert.458
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Psychward
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.KillDisk.288
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Win32.Scherzo.6656
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Asylum.11
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Win32.Urbe
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.WebDL.11
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.DownLoader.3093
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Click.20378
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Shutit.32
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Click.18046
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Asylum.6144
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Click.20008
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.KeyLogger.375
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.DownLoad.3486
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Click.18599
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Avstral
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Win32.Petik.8192
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.MulDrop.23736
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda BackDoor.Dtr.15
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.DownLoader.50793
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.WebDL.10
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.DownLoader
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.DownLoader.2291
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.MulDrop.18267
Malware-Cryptor.Win32.HZ4.12 VirusBlokAda Trojan.Fakealert.13118

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.