Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Malware-Cryptor.Win32.Palka aliases:

Name Vendor Dr.Web classification name
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Fakealert.4194
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Favadd
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.PWS.Panda.30
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoad.25695
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Spambot.2488
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Fakealert.3803
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Fakealert.3799
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Siggen.1109
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.51534
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.10747
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.9145
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.5401
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.5394
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.6811
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Packed.458
Malware-Cryptor.Win32.Palka VirusBlokAda BackDoor.Tdss.115
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoad.31567
Malware-Cryptor.Win32.Palka VirusBlokAda BackDoor.Tdss.141
Malware-Cryptor.Win32.Palka VirusBlokAda Program.Powerkeylog
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Popuper
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.PWS.Wow.664
Malware-Cryptor.Win32.Palka VirusBlokAda Win32.Dref
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.16584
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.14469
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Hoster
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.18775
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Spambot
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.16587
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.16588
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.18779
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoader.58315
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Virtumod.416
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Virtumod.402
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Iespy
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Proxy.3737
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoad.35944
Malware-Cryptor.Win32.Palka VirusBlokAda BackDoor.Tdss.149
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DnsChange
Malware-Cryptor.Win32.Palka VirusBlokAda Win32.Polipos
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Rntm.6
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.PWS.Banker.22518
Malware-Cryptor.Win32.Palka VirusBlokAda Win32.Driller
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Fakealert.4305
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.MulDrop.31657
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Spambot.2838
Malware-Cryptor.Win32.Palka VirusBlokAda BackDoor.Tdss.180
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.DownLoad.37564
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Tofger.15000
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.Tofger.7000
Malware-Cryptor.Win32.Palka VirusBlokAda Trojan.MulDrop.878

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.