Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_FCRYPTER.A aliases:

Name Vendor Dr.Web classification name
TROJ_FCRYPTER.A Trend Micro Trojan.Packed.1197
TROJ_FCRYPTER.A Trend Micro Trojan.Luzya
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.15891
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.9716
TROJ_FCRYPTER.A Trend Micro Trojan.DownLoader.35134
TROJ_FCRYPTER.A Trend Micro Trojan.Grim.1
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.1890
TROJ_FCRYPTER.A Trend Micro Trojan.Packed.166
TROJ_FCRYPTER.A Trend Micro BackDoor.ProRat.252
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.1417
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.2220
TROJ_FCRYPTER.A Trend Micro BackDoor.ProRat
TROJ_FCRYPTER.A Trend Micro BackDoor.Bifrost.740
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.8506
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.17600
TROJ_FCRYPTER.A Trend Micro Trojan.DownLoader.56862
TROJ_FCRYPTER.A Trend Micro BackDoor.AntiLame.20
TROJ_FCRYPTER.A Trend Micro BackDoor.Dax
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.11825
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.2102
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.9434
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.16569
TROJ_FCRYPTER.A Trend Micro Trojan.KeyLogger.1438
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.1407
TROJ_FCRYPTER.A Trend Micro Trojan.DownLoad.1126
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.18200
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.4182
TROJ_FCRYPTER.A Trend Micro Trojan.ProAgent.20
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.6390
TROJ_FCRYPTER.A Trend Micro Trojan.Packed.194
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.1941
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.15582
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.5825
TROJ_FCRYPTER.A Trend Micro Trojan.DownLoader.51272
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.4308
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.MSNPass
TROJ_FCRYPTER.A Trend Micro Tool.IpdBrute
TROJ_FCRYPTER.A Trend Micro BackDoor.Vxc
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.15589
TROJ_FCRYPTER.A Trend Micro Win32.HLLP.Jeefo.36352
TROJ_FCRYPTER.A Trend Micro BackDoor.Bla
TROJ_FCRYPTER.A Trend Micro Trojan.DownLoader.26661
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.54863
TROJ_FCRYPTER.A Trend Micro Trojan.Packed.494
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.876
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.Banker.9441
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.7534
TROJ_FCRYPTER.A Trend Micro BackDoor.Bifrost.834
TROJ_FCRYPTER.A Trend Micro Trojan.MulDrop.1161
TROJ_FCRYPTER.A Trend Micro Trojan.PWS.LDPinch.3213

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.