Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.23904
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.5509
Cryp_Xed-12 Trend Micro Win32.HLLW.MyBot.4413
Cryp_Xed-12 Trend Micro Win32.HLLW.MyBot.3632
Cryp_Xed-12 Trend Micro Trojan.DownLoad.3731
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.1412
Cryp_Xed-12 Trend Micro Trojan.DownLoader.10552
Cryp_Xed-12 Trend Micro Trojan.DownLoader.15811
Cryp_Xed-12 Trend Micro Trojan.PWS.LDPinch.1719
Cryp_Xed-12 Trend Micro Trojan.MulDrop.20199
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.2022
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.17042
Cryp_Xed-12 Trend Micro Trojan.DownLoader.50512
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1322
Cryp_Xed-12 Trend Micro Trojan.DownLoader.17077
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.1222
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8995
Cryp_Xed-12 Trend Micro Trojan.Proxy.734
Cryp_Xed-12 Trend Micro Trojan.PWS.LDPinch.3528
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2737
Cryp_Xed-12 Trend Micro Trojan.LowZones.2040
Cryp_Xed-12 Trend Micro Trojan.DownLoad.14909
Cryp_Xed-12 Trend Micro Trojan.Popwin.695
Cryp_Xed-12 Trend Micro Win32.HLLW.Rubbish.32
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5441
Cryp_Xed-12 Trend Micro Trojan.Click.50102
Cryp_Xed-12 Trend Micro Trojan.Click.50020
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24345
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.3069
Cryp_Xed-12 Trend Micro Trojan.Click.4224
Cryp_Xed-12 Trend Micro BackDoor.Pangu
Cryp_Xed-12 Trend Micro Trojan.Click.49746
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1604
Cryp_Xed-12 Trend Micro Trojan.Click.49441
Cryp_Xed-12 Trend Micro Trojan.Click.2504
Cryp_Xed-12 Trend Micro Trojan.DownLoader.33628
Cryp_Xed-12 Trend Micro Trojan.DownLoader.52499
Cryp_Xed-12 Trend Micro Trojan.DownLoader.38062
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.524
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3067
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5190
Cryp_Xed-12 Trend Micro Trojan.MulDrop.16207
Cryp_Xed-12 Trend Micro Trojan.DownLoader.24670
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29904
Cryp_Xed-12 Trend Micro Trojan.NtRootKit.163
Cryp_Xed-12 Trend Micro Trojan.DownLoader.33220
Cryp_Xed-12 Trend Micro Trojan.DownLoader.36736
Cryp_Xed-12 Trend Micro Trojan.DownLoader.62660
Cryp_Xed-12 Trend Micro Trojan.ActualSpy
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.52

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.