Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Crypt.PEC2X.Gen aliases:

Name Vendor Dr.Web classification name
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.6428
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.78
TR/Crypt.PEC2X.Gen Avira Trojan.Proxy.1019
TR/Crypt.PEC2X.Gen Avira Dialer.Mella
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.9285
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.9396
TR/Crypt.PEC2X.Gen Avira Dialer.Energy.42
TR/Crypt.PEC2X.Gen Avira Trojan.DownLoader.53392
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.11204
TR/Crypt.PEC2X.Gen Avira BackDoor.IRC.Wisdom
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.84
TR/Crypt.PEC2X.Gen Avira Dialer.Cool
TR/Crypt.PEC2X.Gen Avira Trojan.Click.1485
TR/Crypt.PEC2X.Gen Avira Tool.Transmit
TR/Crypt.PEC2X.Gen Avira Trojan.Fakealert.507
TR/Crypt.PEC2X.Gen Avira Trojan.PWS.LDPinch.462
TR/Crypt.PEC2X.Gen Avira Trojan.DownLoader.23039
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.11227
TR/Crypt.PEC2X.Gen Avira Trojan.SPuper
TR/Crypt.PEC2X.Gen Avira Trojan.Fakealert.321
TR/Crypt.PEC2X.Gen Avira Dialer.Energy
TR/Crypt.PEC2X.Gen Avira Trojan.Fakealert.341
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.112
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.104
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.92
TR/Crypt.PEC2X.Gen Avira Trojan.PWS.GoldSpy.2147
TR/Crypt.PEC2X.Gen Avira Trojan.Aphex.5642
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.9991
TR/Crypt.PEC2X.Gen Avira Trojan.PWS.GoldSpy.2146
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.11186
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.6954
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.77
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.95
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.110
TR/Crypt.PEC2X.Gen Avira Trojan.Fakealert
TR/Crypt.PEC2X.Gen Avira Trojan.Fakealert.434
TR/Crypt.PEC2X.Gen Avira Trojan.Fakealert.705
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.96
TR/Crypt.PEC2X.Gen Avira Trojan.DownLoader.20139
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.11229
TR/Crypt.PEC2X.Gen Avira Trojan.ZDown
TR/Crypt.PEC2X.Gen Avira Trojan.Conyc
TR/Crypt.PEC2X.Gen Avira BackDoor.IRC.Cirilico
TR/Crypt.PEC2X.Gen Avira BackDoor.IRC.Tdongs
TR/Crypt.PEC2X.Gen Avira Trojan.MulDrop.18448
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.120
TR/Crypt.PEC2X.Gen Avira Trojan.Mezzia.122
TR/Crypt.PEC2X.Gen Avira Exploit.DCom.9
TR/Crypt.PEC2X.Gen Avira Trojan.DownLoader.30315

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.