Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Crypt.PEPM.Gen aliases:

Name Vendor Dr.Web classification name
TR/Crypt.PEPM.Gen Avira Trojan.MulDrop.3483
TR/Crypt.PEPM.Gen Avira Trojan.MulDrop.9787
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.10042
TR/Crypt.PEPM.Gen Avira Trojan.Packed.166
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.21035
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.7154
TR/Crypt.PEPM.Gen Avira Win32.HLLW.MyBot
TR/Crypt.PEPM.Gen Avira Trojan.Packed.453
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.13656
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.13688
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.13660
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.13752
TR/Crypt.PEPM.Gen Avira Trojan.MulDrop.8344
TR/Crypt.PEPM.Gen Avira Trojan.Packed.158
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.19414
TR/Crypt.PEPM.Gen Avira BackDoor.Generic.1437
TR/Crypt.PEPM.Gen Avira Trojan.Packed.487
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.26661
TR/Crypt.PEPM.Gen Avira Trojan.Packed.143
TR/Crypt.PEPM.Gen Avira Trojan.PWS.LDPinch.1407
TR/Crypt.PEPM.Gen Avira Trojan.PWS.LDPinch.1607
TR/Crypt.PEPM.Gen Avira Trojan.Packed.516
TR/Crypt.PEPM.Gen Avira DDoS.Carvan
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.5611
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.1176
TR/Crypt.PEPM.Gen Avira Trojan.Suicide
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.64414
TR/Crypt.PEPM.Gen Avira Trojan.PWS.LDPinch.1417
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.21345
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.20031
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.35134
TR/Crypt.PEPM.Gen Avira Trojan.Packed.162
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.18987
TR/Crypt.PEPM.Gen Avira Tool.Transmit
TR/Crypt.PEPM.Gen Avira BackDoor.Generic.1273
TR/Crypt.PEPM.Gen Avira Trojan.Packed.454
TR/Crypt.PEPM.Gen Avira Trojan.MulDrop.6989
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.21087
TR/Crypt.PEPM.Gen Avira Trojan.Virtumod.206
TR/Crypt.PEPM.Gen Avira Trojan.MulDrop.17600
TR/Crypt.PEPM.Gen Avira Trojan.MulDrop.8208
TR/Crypt.PEPM.Gen Avira Trojan.Proxy.3036
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.7066
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.42540
TR/Crypt.PEPM.Gen Avira Win32.Grum
TR/Crypt.PEPM.Gen Avira Win32.IRC.Bot.84
TR/Crypt.PEPM.Gen Avira Trojan.PWS.Banker.10663
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.46495
TR/Crypt.PEPM.Gen Avira Trojan.Proxy.2364
TR/Crypt.PEPM.Gen Avira Trojan.DownLoader.7812

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.