Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.MulDrop.14495
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7186
Cryp_Xed-12 Trend Micro Trojan.DownLoader.37238
Cryp_Xed-12 Trend Micro Trojan.PWS.Wow.913
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.origin
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2399
Cryp_Xed-12 Trend Micro Trojan.MulDrop.33563
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4195
Cryp_Xed-12 Trend Micro Trojan.MulDrop.15725
Cryp_Xed-12 Trend Micro DDoS.Attack.240
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2441
Cryp_Xed-12 Trend Micro Trojan.DownLoader.62487
Cryp_Xed-12 Trend Micro Trojan.MulDrop.16200
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6305
Cryp_Xed-12 Trend Micro Trojan.DownLoader.63821
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6298
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.797
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4951
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.10265
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2283
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.14505
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5187
Cryp_Xed-12 Trend Micro Trojan.DownLoad.27890
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.3540
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5158
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4820
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5004
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5341
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.2043
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5994
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5990
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6011
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7864
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4211
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4160
Cryp_Xed-12 Trend Micro Trojan.DownLoader.33419
Cryp_Xed-12 Trend Micro Trojan.Siggen.2427
Cryp_Xed-12 Trend Micro Trojan.DownLoader.34005
Cryp_Xed-12 Trend Micro Trojan.DownLoader.32065
Cryp_Xed-12 Trend Micro Trojan.DownLoader.33400
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2095
Cryp_Xed-12 Trend Micro Trojan.DownLoader.30348
Cryp_Xed-12 Trend Micro Trojan.MulDrop.13116
Cryp_Xed-12 Trend Micro BackDoor.Leviat
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2341
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5374
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.based
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3194
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.1875
Cryp_Xed-12 Trend Micro Trojan.Winlock.77

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.