Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.Click.1338
Cryp_Xed-12 Trend Micro Trojan.DownLoader.49024
Cryp_Xed-12 Trend Micro BackDoor.Bifrost.11
Cryp_Xed-12 Trend Micro Trojan.Siggen.60527
Cryp_Xed-12 Trend Micro Trojan.DownLoader.63848
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9601
Cryp_Xed-12 Trend Micro Trojan.MulDrop.30088
Cryp_Xed-12 Trend Micro Trojan.Popwin.1138
Cryp_Xed-12 Trend Micro Trojan.Click.4449
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6265
Cryp_Xed-12 Trend Micro Trojan.Siggen.57285
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.13846
Cryp_Xed-12 Trend Micro Trojan.MulDrop.30041
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5841
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.11258
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6092
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5992
Cryp_Xed-12 Trend Micro BackDoor.Haxdoor.544
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5832
Cryp_Xed-12 Trend Micro Trojan.Siggen.3566
Cryp_Xed-12 Trend Micro Trojan.MulDrop.33875
Cryp_Xed-12 Trend Micro Trojan.DownLoad.28807
Cryp_Xed-12 Trend Micro Trojan.DownLoader.38016
Cryp_Xed-12 Trend Micro Trojan.DownLoader.47459
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2260
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6413
Cryp_Xed-12 Trend Micro Trojan.DownLoader.36141
Cryp_Xed-12 Trend Micro Trojan.PWS.Wmd.5
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3882
Cryp_Xed-12 Trend Micro Trojan.DownLoader.28191
Cryp_Xed-12 Trend Micro Trojan.Click.16828
Cryp_Xed-12 Trend Micro Trojan.DownLoader.6532
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5824
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5735
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.13373
Cryp_Xed-12 Trend Micro Trojan.DownLoader.28244
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5820
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5487
Cryp_Xed-12 Trend Micro Trojan.DownLoader.52619
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5731
Cryp_Xed-12 Trend Micro Trojan.Bizten.18978
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.14807
Cryp_Xed-12 Trend Micro Trojan.MulDrop.12130
Cryp_Xed-12 Trend Micro BackDoor.Bifrost.64
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5569
Cryp_Xed-12 Trend Micro Trojan.DownLoader.25984
Cryp_Xed-12 Trend Micro Trojan.Click.50069
Cryp_Xed-12 Trend Micro Trojan.Click.49877
Cryp_Xed-12 Trend Micro Trojan.DownLoader.24002
Cryp_Xed-12 Trend Micro Trojan.Click.49851

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.