Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.DownLoader.44863
Cryp_Xed-12 Trend Micro Program.RemoteAdmin
Cryp_Xed-12 Trend Micro BackDoor.IRC.Omat
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11056
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16050
Cryp_Xed-12 Trend Micro Trojan.Siggen.4616
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.51
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1543
Cryp_Xed-12 Trend Micro Trojan.DownLoader.16936
Cryp_Xed-12 Trend Micro Trojan.DownLoader.15479
Cryp_Xed-12 Trend Micro Trojan.DownLoader.10767
Cryp_Xed-12 Trend Micro Trojan.Click.2338
Cryp_Xed-12 Trend Micro Win32.HLLM.Dref
Cryp_Xed-12 Trend Micro Trojan.DownLoader.4243
Cryp_Xed-12 Trend Micro Trojan.MulDrop.10527
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.8210
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.2271
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4332
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5096
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.2809
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6740
Cryp_Xed-12 Trend Micro Trojan.Click.24388
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9457
Cryp_Xed-12 Trend Micro Trojan.DownLoader.57330
Cryp_Xed-12 Trend Micro Trojan.DownLoader.57502
Cryp_Xed-12 Trend Micro Trojan.DownLoader.65478
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9562
Cryp_Xed-12 Trend Micro Trojan.MulDrop.4681
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6508
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2594
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6753
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.2607
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7100
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1732
Cryp_Xed-12 Trend Micro Trojan.DownLoader.53443
Cryp_Xed-12 Trend Micro Trojan.DownLoader.55588
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9139
Cryp_Xed-12 Trend Micro Trojan.Goner.64
Cryp_Xed-12 Trend Micro Trojan.Goner.61
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8305
Cryp_Xed-12 Trend Micro Trojan.DownLoader.30073
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.3404
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9839
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.796
Cryp_Xed-12 Trend Micro BackDoor.IRC.Sdbot.based
Cryp_Xed-12 Trend Micro Trojan.Popwin.708
Cryp_Xed-12 Trend Micro Trojan.MulDrop.18422
Cryp_Xed-12 Trend Micro Trojan.DownLoader.6507
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4524
Cryp_Xed-12 Trend Micro BackDoor.Hacked

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.