Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.18344
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1345
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2226
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.6345
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3547
Cryp_Xed-12 Trend Micro Trojan.Baidu
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3580
Cryp_Xed-12 Trend Micro Trojan.DownLoader.7783
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1554
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3698
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3102
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3073
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3579
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3747
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3679
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3327
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3652
Cryp_Xed-12 Trend Micro Trojan.DownLoader.9333
Cryp_Xed-12 Trend Micro Trojan.DownLoader.7283
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3396
Cryp_Xed-12 Trend Micro Trojan.MulDrop.6205
Cryp_Xed-12 Trend Micro Trojan.PWS.Siggen.3215
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.8321
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.6567
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.16588
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3173
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3136
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1526
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3131
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.12052
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3231
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.490
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.450
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3165
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.491
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3214
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.422
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3130
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.462
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3170
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3091
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.442
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.423
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.447
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.420
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.467
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3647
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3133
Cryp_Xed-12 Trend Micro Constructor.Siggen.857
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.432

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.