Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_NUCRYPT.GEN aliases:

Name Vendor Dr.Web classification name
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.142
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.135
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.140
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.114
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.193
WORM_NUCRYPT.GEN Trend Micro Trojan.Click.4194
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.192
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.138
WORM_NUCRYPT.GEN Trend Micro Trojan.Wmchange
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.215
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.213
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.216
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.212
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.187
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.145
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.68
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.3316
WORM_NUCRYPT.GEN Trend Micro Trojan.MulDrop.14986
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.26
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.2162
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.1383
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.3207
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.3247
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.3063
WORM_NUCRYPT.GEN Trend Micro Adware.Supa
WORM_NUCRYPT.GEN Trend Micro Trojan.DownLoader.9171
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.2426
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.3002
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.3007
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.2551
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.211
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.591
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.218
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.150
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.159
WORM_NUCRYPT.GEN Trend Micro Trojan.DownLoader.31271
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.2566
WORM_NUCRYPT.GEN Trend Micro Trojan.DownLoader.19256
WORM_NUCRYPT.GEN Trend Micro Trojan.Popuper
WORM_NUCRYPT.GEN Trend Micro Trojan.DownLoader.59069
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.1354
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.1332
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.1359
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.1362
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.1342
WORM_NUCRYPT.GEN Trend Micro Trojan.PWS.LDPinch.1619
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.365
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.48
WORM_NUCRYPT.GEN Trend Micro Trojan.Spambot.2695
WORM_NUCRYPT.GEN Trend Micro Trojan.Packed.71

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.