Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-15 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-15 Trend Micro Trojan.Packed.Gen
Cryp_Xed-15 Trend Micro BackDoor.Pigeon.21851
Cryp_Xed-15 Trend Micro Win32.Dictator.5632
Cryp_Xed-15 Trend Micro Win32.Duksten.10240
Cryp_Xed-15 Trend Micro Trojan.DownLoad.33481
Cryp_Xed-15 Trend Micro Win32.Tenhi.1727
Cryp_Xed-15 Trend Micro Win32.Return.5241
Cryp_Xed-15 Trend Micro BackDoor.Nels
Cryp_Xed-15 Trend Micro Win32.Triplix.3072
Cryp_Xed-15 Trend Micro Win32.NGVCK.2134
Cryp_Xed-15 Trend Micro Win32.Crosser.3548
Cryp_Xed-15 Trend Micro Win32.Rike.1492
Cryp_Xed-15 Trend Micro Win32.Virut.56
Cryp_Xed-15 Trend Micro FDOS.Meto
Cryp_Xed-15 Trend Micro Win32.Rike.1480
Cryp_Xed-15 Trend Micro Trojan.DownLoad.35521
Cryp_Xed-15 Trend Micro Trojan.Click.24119
Cryp_Xed-15 Trend Micro Win32.Manyx.13572
Cryp_Xed-15 Trend Micro Win32.Virut.65
Cryp_Xed-15 Trend Micro Trojan.Proxy.3208
Cryp_Xed-15 Trend Micro Win32.Whg.1193
Cryp_Xed-15 Trend Micro Win32.Siller.1455
Cryp_Xed-15 Trend Micro Trojan.DownLoader.4177
Cryp_Xed-15 Trend Micro Win32.Alechka.1168
Cryp_Xed-15 Trend Micro Win32.Grum
Cryp_Xed-15 Trend Micro Win32.HLLM.Xgray
Cryp_Xed-15 Trend Micro Win32.GhostDog.2376
Cryp_Xed-15 Trend Micro Win32.Thorin.11932
Cryp_Xed-15 Trend Micro Win32.Bumblebee.4434
Cryp_Xed-15 Trend Micro Trojan.MulDrop.5888
Cryp_Xed-15 Trend Micro Trojan.DownLoad.3694
Cryp_Xed-15 Trend Micro Trojan.DownLoad.26773
Cryp_Xed-15 Trend Micro Win32.Virut.55
Cryp_Xed-15 Trend Micro Trojan.MulDrop.17431
Cryp_Xed-15 Trend Micro Win32.NGVCK.989
Cryp_Xed-15 Trend Micro Win32.NGVCK.991
Cryp_Xed-15 Trend Micro Win32.NGVCK.990
Cryp_Xed-15 Trend Micro Win32.FunLove.4608
Cryp_Xed-15 Trend Micro DownLoader.Generator
Cryp_Xed-15 Trend Micro Trojan.Click.5009
Cryp_Xed-15 Trend Micro Trojan.DownLoader.62001
Cryp_Xed-15 Trend Micro Trojan.DownLoad.39000
Cryp_Xed-15 Trend Micro Win32.Hrom
Cryp_Xed-15 Trend Micro Trojan.PWS.LDPinch.2273
Cryp_Xed-15 Trend Micro Trojan.Packed.140
Cryp_Xed-15 Trend Micro Win32.Siggen.2
Cryp_Xed-15 Trend Micro Trojan.MulDrop.31224
Cryp_Xed-15 Trend Micro Win32.Doser.4539
Cryp_Xed-15 Trend Micro Win32.Padme
Cryp_Xed-15 Trend Micro Win32.Bondage.968

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.