Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/CryptExe.A aliases:

Name Vendor Dr.Web classification name
Win32/CryptExe.A AVG Trojan.Warring
Win32/CryptExe.A AVG Trojan.Klog.32786
Win32/CryptExe.A AVG Trojan.DownLoader.1281
Win32/CryptExe.A AVG Trojan.PWS.Wsgame.4085
Win32/CryptExe.A AVG Trojan.PWS.Wow.751
Win32/CryptExe.A AVG Trojan.DownLoader.58278
Win32/CryptExe.A AVG BackDoor.DarkMoon.54
Win32/CryptExe.A AVG BackDoor.Pigeon.12660
Win32/CryptExe.A AVG Program.Mirkov
Win32/CryptExe.A AVG Trojan.PWS.Wow.694
Win32/CryptExe.A AVG Trojan.PWS.Wow.674
Win32/CryptExe.A AVG Trojan.PWS.Wow.703
Win32/CryptExe.A AVG Trojan.PWS.Wow.732
Win32/CryptExe.A AVG Trojan.MulDrop.12276
Win32/CryptExe.A AVG BackDoor.Poison.40
Win32/CryptExe.A AVG Trojan.DownLoader.56710
Win32/CryptExe.A AVG BackDoor.Poison
Win32/CryptExe.A AVG BackDoor.Bifrost.36
Win32/CryptExe.A AVG BackDoor.Wojass
Win32/CryptExe.A AVG Trojan.DownLoader.17528
Win32/CryptExe.A AVG Trojan.Wlelock
Win32/CryptExe.A AVG Trojan.PWS.Wow
Win32/CryptExe.A AVG BackDoor.Generic.1693
Win32/CryptExe.A AVG BackDoor.Shell
Win32/CryptExe.A AVG Trojan.DownLoader.53792
Win32/CryptExe.A AVG BackDoor.Bifrost
Win32/CryptExe.A AVG Trojan.Inject.3466
Win32/CryptExe.A AVG Trojan.DownLoad.44
Win32/CryptExe.A AVG Trojan.PWS.Wow.657
Win32/CryptExe.A AVG Tool.Netcat
Win32/CryptExe.A AVG Trojan.KeyLogger.1438
Win32/CryptExe.A AVG BackDoor.BioNet.403
Win32/CryptExe.A AVG Trojan.DownLoader.63776
Win32/CryptExe.A AVG Trojan.DownLoader.3879
Win32/CryptExe.A AVG BackDoor.BlackHole.2076
Win32/CryptExe.A AVG BackDoor.BlackHole.2085
Win32/CryptExe.A AVG Trojan.KeyLogger.603
Win32/CryptExe.A AVG Trojan.PWS.Banker.27403
Win32/CryptExe.A AVG Trojan.Siggen.2114
Win32/CryptExe.A AVG Trojan.PWS.Banker.24385
Win32/CryptExe.A AVG BackDoor.BOrifice.11
Win32/CryptExe.A AVG Trojan.Iespy.376
Win32/CryptExe.A AVG BackDoor.NetBus.170
Win32/CryptExe.A AVG Trojan.DownLoad.4394
Win32/CryptExe.A AVG Trojan.PWS.Gamania.18403
Win32/CryptExe.A AVG Trojan.PWS.Wow.675
Win32/CryptExe.A AVG BackDoor.Nuclearat.83
Win32/CryptExe.A AVG BackDoor.Turkojan.20
Win32/CryptExe.A AVG BackDoor.ProRat
Win32/CryptExe.A AVG Trojan.MulDrop.19121

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.