FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.5071
Cryp_Xed-12 Trend Micro Trojan.Click.1363
Cryp_Xed-12 Trend Micro Trojan.Click.1348
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6527
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.3557
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2231
Cryp_Xed-12 Trend Micro BackDoor.Optix.131
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.19806
Cryp_Xed-12 Trend Micro Trojan.DownLoader.57330
Cryp_Xed-12 Trend Micro Trojan.DownLoader.57502
Cryp_Xed-12 Trend Micro Trojan.DownLoader.65478
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9562
Cryp_Xed-12 Trend Micro Trojan.MulDrop.4681
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5519
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.3024
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5908
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6617
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2540
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6091
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2658
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5902
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5102
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6592
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6508
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2605
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2594
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6753
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.2607
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7100
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1732
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.3456
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11275
Cryp_Xed-12 Trend Micro Trojan.DownLoader.53443
Cryp_Xed-12 Trend Micro Trojan.DownLoader.55588
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.9774
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9289
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2179
Cryp_Xed-12 Trend Micro Trojan.MulDrop.6278
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7905
Cryp_Xed-12 Trend Micro Trojan.PWS.LDPinch.1036
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.1107
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.1060
Cryp_Xed-12 Trend Micro Trojan.PWS.Syska
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9139
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6213
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5167
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1291
Cryp_Xed-12 Trend Micro Trojan.DownLoader.24154
Cryp_Xed-12 Trend Micro Trojan.Goner.64
Cryp_Xed-12 Trend Micro Trojan.Goner.61

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies