Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2900
Cryp_Xed-12 Trend Micro Trojan.Packed.454
Cryp_Xed-12 Trend Micro Trojan.Hitpop.47
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3386
Cryp_Xed-12 Trend Micro Trojan.DownLoad.7612
Cryp_Xed-12 Trend Micro BackDoor.Klj
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2604
Cryp_Xed-12 Trend Micro Trojan.DownLoader.42723
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3534
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3127
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.5721
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3780
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3393
Cryp_Xed-12 Trend Micro Trojan.Hitpop.212
Cryp_Xed-12 Trend Micro Trojan.Hitpop.182
Cryp_Xed-12 Trend Micro Win32.HLLW.Muspace
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.1568
Cryp_Xed-12 Trend Micro Trojan.Fakealert.457
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3398
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3209
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3542
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3731
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3571
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3407
Cryp_Xed-12 Trend Micro BackDoor.Beizhu.1054
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2414
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8774
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7989
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8174
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3553
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7408
Cryp_Xed-12 Trend Micro Trojan.MulDrop.13107
Cryp_Xed-12 Trend Micro Trojan.PWS.Wool
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2671
Cryp_Xed-12 Trend Micro Win32.HLLM.Bagz
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.2071
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.2200
Cryp_Xed-12 Trend Micro Trojan.DownLoad.31051
Cryp_Xed-12 Trend Micro Trojan.MulDrop.35162
Cryp_Xed-12 Trend Micro Trojan.Proxy.820
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.2699
Cryp_Xed-12 Trend Micro Trojan.DownLoader.50735
Cryp_Xed-12 Trend Micro Trojan.DownLoader.52243
Cryp_Xed-12 Trend Micro Trojan.DownLoader.14959
Cryp_Xed-12 Trend Micro Trojan.DownLoad.29084
Cryp_Xed-12 Trend Micro Trojan.PinchBuilder.2
Cryp_Xed-12 Trend Micro Trojan.DownLoad.27967
Cryp_Xed-12 Trend Micro Trojan.DownLoad.27611
Cryp_Xed-12 Trend Micro BackDoor.IRC.Nameless
Cryp_Xed-12 Trend Micro BackDoor.IRC.Calibre

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.