Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.796
Cryp_Xed-12 Trend Micro Trojan.DownLoader.6507
Cryp_Xed-12 Trend Micro Trojan.MulDrop.4385
Cryp_Xed-12 Trend Micro Trojan.Hitpop.314
Cryp_Xed-12 Trend Micro BackDoor.IRC.HellBot
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.1107
Cryp_Xed-12 Trend Micro Trojan.DownLoader.4431
Cryp_Xed-12 Trend Micro Trojan.Click.3961
Cryp_Xed-12 Trend Micro Trojan.DownLoad.27005
Cryp_Xed-12 Trend Micro Trojan.DownLoad.15186
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1303
Cryp_Xed-12 Trend Micro Trojan.Click.841
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6538
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.9532
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4155
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.2825
Cryp_Xed-12 Trend Micro Trojan.DownLoader.15548
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.10547
Cryp_Xed-12 Trend Micro Trojan.Hitpop.1916
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8334
Cryp_Xed-12 Trend Micro BackDoor.Cedrich
Cryp_Xed-12 Trend Micro Trojan.MulDrop.35486
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11007
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5543
Cryp_Xed-12 Trend Micro Trojan.DownLoader.55087
Cryp_Xed-12 Trend Micro Trojan.Click.4463
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3637
Cryp_Xed-12 Trend Micro BackDoor.IRC.YulihuBot.19
Cryp_Xed-12 Trend Micro Trojan.DownLoad.1149
Cryp_Xed-12 Trend Micro Trojan.MulDrop.23001
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.182
Cryp_Xed-12 Trend Micro Trojan.MulDrop.10518
Cryp_Xed-12 Trend Micro Trojan.DownLoad.32532
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2437
Cryp_Xed-12 Trend Micro Trojan.Popuper.27047
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.7796
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.9976
Cryp_Xed-12 Trend Micro BackDoor.IRC.Sdbot.2223
Cryp_Xed-12 Trend Micro Trojan.DownLoader.7497
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.1249
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5035
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6247
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5294
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.1988
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5591
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5602
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5808
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5471
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6023
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5951

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.