Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.DownLoad.7612
Cryp_Xed-12 Trend Micro Trojan.Fakealert.457
Cryp_Xed-12 Trend Micro BackDoor.Beizhu.1054
Cryp_Xed-12 Trend Micro Win32.HLLM.Bagz
Cryp_Xed-12 Trend Micro Trojan.Proxy.820
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.2699
Cryp_Xed-12 Trend Micro BackDoor.IRC.Calibre
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.12565
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9661
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2061
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3037
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.2411
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7799
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4489
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5124
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4063
Cryp_Xed-12 Trend Micro BackDoor.Moons
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17142
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.18077
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17479
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17684
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.18057
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8693
Cryp_Xed-12 Trend Micro Trojan.DownLoader.12788
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11778
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5186
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.15204
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29419
Cryp_Xed-12 Trend Micro Trojan.MulDrop.12328
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3998
Cryp_Xed-12 Trend Micro Trojan.DownLoader.26821
Cryp_Xed-12 Trend Micro Trojan.Inject.5760
Cryp_Xed-12 Trend Micro Trojan.Click.4460
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3938
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.42744
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6430
Cryp_Xed-12 Trend Micro Adware.Siggen.2711
Cryp_Xed-12 Trend Micro Trojan.DownLoader.7188
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.5754
Cryp_Xed-12 Trend Micro Trojan.DownLoader.9227
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1067
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1290
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5571
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5521
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5447
Cryp_Xed-12 Trend Micro Trojan.DownLoader.7239
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7957
Cryp_Xed-12 Trend Micro Trojan.MulDrop.4727
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3496
Cryp_Xed-12 Trend Micro Trojan.DownLoad.9341

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.