FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.9368
Cryp_Xed-12 Trend Micro Trojan.DownLoader.30840
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8323
Cryp_Xed-12 Trend Micro Trojan.MulDrop.12329
Cryp_Xed-12 Trend Micro Trojan.DownLoader.15853
Cryp_Xed-12 Trend Micro Trojan.DownLoader.27275
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7498
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.1057
Cryp_Xed-12 Trend Micro Trojan.Click.619
Cryp_Xed-12 Trend Micro Trojan.PWS.Ragnarok
Cryp_Xed-12 Trend Micro Trojan.DownLoader.30081
Cryp_Xed-12 Trend Micro Trojan.DownLoader.4992
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29099
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3026
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.6856
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7416
Cryp_Xed-12 Trend Micro BackDoor.NetContr.32
Cryp_Xed-12 Trend Micro Trojan.MulDrop.18399
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5956
Cryp_Xed-12 Trend Micro Trojan.DownLoader.39304
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7323
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2157
Cryp_Xed-12 Trend Micro Trojan.PWS.GoldSpy.2619
Cryp_Xed-12 Trend Micro Trojan.Packed.139
Cryp_Xed-12 Trend Micro Trojan.BhoSpy.19
Cryp_Xed-12 Trend Micro Trojan.PWS.Hangame.808
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1530
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.1580
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.13151
Cryp_Xed-12 Trend Micro Trojan.Click.3958
Cryp_Xed-12 Trend Micro Trojan.DownLoader.62368
Cryp_Xed-12 Trend Micro Trojan.DownLoader.59702
Cryp_Xed-12 Trend Micro Trojan.DownLoader.59697
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2297
Cryp_Xed-12 Trend Micro Dialer.Energy.42
Cryp_Xed-12 Trend Micro Trojan.DownLoader.37104
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9509
Cryp_Xed-12 Trend Micro Trojan.Popuper.27305
Cryp_Xed-12 Trend Micro Trojan.Swizzor.7947
Cryp_Xed-12 Trend Micro Trojan.Microjo.45
Cryp_Xed-12 Trend Micro Trojan.Bizten.18971
Cryp_Xed-12 Trend Micro Trojan.Popuper.27181
Cryp_Xed-12 Trend Micro Trojan.Popuper.27152
Cryp_Xed-12 Trend Micro Trojan.Popuper.27149
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.4362
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5857
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5834
Cryp_Xed-12 Trend Micro Trojan.DownLoader.44863
Cryp_Xed-12 Trend Micro Trojan.Hitpop.2101
Cryp_Xed-12 Trend Micro Program.RemoteAdmin

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies