Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29241
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.20099
Cryp_Xed-12 Trend Micro Win32.HLLW.Ressdt.77
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7873
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5852
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9176
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9229
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9459
Cryp_Xed-12 Trend Micro Trojan.Popuper.26618
Cryp_Xed-12 Trend Micro Trojan.DownLoader.36544
Cryp_Xed-12 Trend Micro Trojan.DownLoad.37496
Cryp_Xed-12 Trend Micro BackDoor.IRC.Madzom
Cryp_Xed-12 Trend Micro Trojan.DownLoader.8126
Cryp_Xed-12 Trend Micro Trojan.MulDrop.33661
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11259
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.4941
Cryp_Xed-12 Trend Micro Trojan.DownLoader.4554
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.3013
Cryp_Xed-12 Trend Micro Win32.HLLW.Nexact
Cryp_Xed-12 Trend Micro Trojan.DownLoader.37082
Cryp_Xed-12 Trend Micro Trojan.DownLoader.32064
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5998
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5522
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5681
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5984
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29835
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9103
Cryp_Xed-12 Trend Micro Win32.HLLW.Kelvin.197
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1462
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.1608
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6523
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6474
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6385
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6498
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6081
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6062
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.13012
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6838
Cryp_Xed-12 Trend Micro Trojan.MulDrop.11171
Cryp_Xed-12 Trend Micro Trojan.MulDrop.30494
Cryp_Xed-12 Trend Micro Trojan.DownLoad.26684
Cryp_Xed-12 Trend Micro BackDoor.IRC.Sdbot.540
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.9933
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11594
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.13055
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.16184
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3102
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.1418
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4886
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.11239

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.