Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.6217
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7512
Cryp_Xed-12 Trend Micro Trojan.PWS.Wmd
Cryp_Xed-12 Trend Micro Trojan.PWS.Baum
Cryp_Xed-12 Trend Micro Trojan.Proxy.739
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3348
Cryp_Xed-12 Trend Micro Trojan.Click.1299
Cryp_Xed-12 Trend Micro Trojan.Click.2326
Cryp_Xed-12 Trend Micro Trojan.DownLoader.14751
Cryp_Xed-12 Trend Micro Trojan.Click.1689
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8788
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4069
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3684
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4531
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4451
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4265
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8503
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.2687
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6356
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6506
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6662
Cryp_Xed-12 Trend Micro BackDoor.Generic.1386
Cryp_Xed-12 Trend Micro Trojan.MulDrop.17500
Cryp_Xed-12 Trend Micro Trojan.Click.24388
Cryp_Xed-12 Trend Micro BackDoor.Insti.126
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.5071
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.3557
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2231
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6617
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6508
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.3456
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11275
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.9774
Cryp_Xed-12 Trend Micro Trojan.PWS.LDPinch.1036
Cryp_Xed-12 Trend Micro Trojan.PWS.Syska
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6213
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5167
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.597
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3869
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.796
Cryp_Xed-12 Trend Micro Trojan.MulDrop.34012
Cryp_Xed-12 Trend Micro Trojan.MulDrop.18422
Cryp_Xed-12 Trend Micro Trojan.DownLoader.25861
Cryp_Xed-12 Trend Micro Trojan.MulDrop.4385
Cryp_Xed-12 Trend Micro Trojan.Hitpop.314
Cryp_Xed-12 Trend Micro BackDoor.Checkban
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.5928
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.2274
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.2058
Cryp_Xed-12 Trend Micro Trojan.Picotan

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.