Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro BackDoor.NetContr.32
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16050
Cryp_Xed-12 Trend Micro Trojan.Siggen.4616
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16820
Cryp_Xed-12 Trend Micro Trojan.MulDrop.16576
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16043
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9729
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29241
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.516
Cryp_Xed-12 Trend Micro Trojan.MulDrop.6017
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.483
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.4319
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.51
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11446
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2590
Cryp_Xed-12 Trend Micro Trojan.PWS.Spy.112
Cryp_Xed-12 Trend Micro Trojan.DownLoader.36047
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.13455
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2543
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.13151
Cryp_Xed-12 Trend Micro Trojan.MulDrop.34182
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.20099
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.8649
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16073
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11581
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.13840
Cryp_Xed-12 Trend Micro Win32.HLLM.Generic.355
Cryp_Xed-12 Trend Micro Trojan.DownLoad.9277
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4057
Cryp_Xed-12 Trend Micro Trojan.StartPage.1394
Cryp_Xed-12 Trend Micro Trojan.DownLoader.8709
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7710
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.13719
Cryp_Xed-12 Trend Micro Win32.HLLW.Ressdt.77
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16064
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3931
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7744
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7873
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7814
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7877
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7654
Cryp_Xed-12 Trend Micro Win32.HLLW.MyBot.141
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7578
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7633
Cryp_Xed-12 Trend Micro Trojan.PWS.Spy.4116
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7660
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5852
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8420
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2808
Cryp_Xed-12 Trend Micro Trojan.DownLoader.52419

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.