Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Malware-Dropper.Win32.Kryptik aliases:

Name Vendor Dr.Web classification name
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Panda.117
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29400
Malware-Dropper.Win32.Kryptik VirusBlokAda Win32.HLLW.Autoruner.6285
Malware-Dropper.Win32.Kryptik VirusBlokAda BackDoor.Zapinit.85
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Click.18048
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Click.18046
Malware-Dropper.Win32.Kryptik VirusBlokAda Win32.HLLW.Autoruner.4612
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DnsChange.1008
Malware-Dropper.Win32.Kryptik VirusBlokAda Win32.HLLW.Autoruner.5207
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Click.20378
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Click.19754
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Click.18599
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Click.18601
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Click.20008
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Multi.27
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Packed.452
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Fakealert.2081
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Fakealert.3873
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoader.50054
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoader.26661
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Siggen.106
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.Fakealert.3988
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Banker.27318
Malware-Dropper.Win32.Kryptik VirusBlokAda BackDoor.Tdss.30
Malware-Dropper.Win32.Kryptik VirusBlokAda BackDoor.Zapinit.101
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.MulDrop.28495
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.MulDrop.20803
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.30095
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29328
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.30030
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29297
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29181
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29283
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.MulDrop.18267
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Panda.30
Malware-Dropper.Win32.Kryptik VirusBlokAda Win32.HLLW.Autoruner.6171
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29313
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29298
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.29442
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Banker.26987
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Panda.16
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Panda.105
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.LDPinch.4308
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.4660
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.PWS.Panda.4
Malware-Dropper.Win32.Kryptik VirusBlokAda Trojan.DownLoad.28089
Malware-Dropper.Win32.Kryptik VirusBlokAda BackDoor.IRC.Cemka
Malware-Dropper.Win32.Kryptik VirusBlokAda Win32.HLLW.Autoruner.6109
Malware-Dropper.Win32.Kryptik VirusBlokAda BackDoor.Tdss.82
Malware-Dropper.Win32.Kryptik VirusBlokAda BackDoor.Tdss.106

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.