Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16820
Cryp_Xed-12 Trend Micro Trojan.Siggen.4616
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29241
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.516
Cryp_Xed-12 Trend Micro Trojan.MulDrop.6017
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.483
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11446
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11581
Cryp_Xed-12 Trend Micro Win32.HLLW.MyBot.141
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.8649
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7710
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.13719
Cryp_Xed-12 Trend Micro Win32.HLLM.Generic.355
Cryp_Xed-12 Trend Micro Win32.HLLW.Ressdt.77
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16064
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.14138
Cryp_Xed-12 Trend Micro Trojan.StartPage.1393
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7744
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7877
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7654
Cryp_Xed-12 Trend Micro Trojan.PWS.Spy.4116
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5852
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.1153
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.6029
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.13010
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.1472
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9176
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9229
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9459
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6022
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5372
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4992
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5232
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1784
Cryp_Xed-12 Trend Micro Trojan.Popuper.25483
Cryp_Xed-12 Trend Micro Trojan.Popuper.26775
Cryp_Xed-12 Trend Micro Trojan.Popuper.26023
Cryp_Xed-12 Trend Micro Trojan.Popuper.26618
Cryp_Xed-12 Trend Micro Trojan.Popuper.26668
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5044
Cryp_Xed-12 Trend Micro Trojan.MulDrop.18112
Cryp_Xed-12 Trend Micro Trojan.DownLoader.36544
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3890
Cryp_Xed-12 Trend Micro Trojan.DownLoader.64586
Cryp_Xed-12 Trend Micro Trojan.DownLoader.54308
Cryp_Xed-12 Trend Micro Trojan.DownLoader.17619
Cryp_Xed-12 Trend Micro BackDoor.PSClient.origin
Cryp_Xed-12 Trend Micro Trojan.DownLoad.37496
Cryp_Xed-12 Trend Micro BackDoor.IRC.Fearbot
Cryp_Xed-12 Trend Micro BackDoor.Foodler

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.