FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3124
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3161
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3153
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3129
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3140
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3191
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3219
Cryp_Xed-12 Trend Micro BackDoor.IRC.Sdbot.844
Cryp_Xed-12 Trend Micro Trojan.Qhost.1355
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3242
Cryp_Xed-12 Trend Micro Trojan.DownLoader.7953
Cryp_Xed-12 Trend Micro Trojan.Siggen1.5167
Cryp_Xed-12 Trend Micro Trojan.Siggen1.6099
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8056
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.5797
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7945
Cryp_Xed-12 Trend Micro Trojan.MulDrop.13748
Cryp_Xed-12 Trend Micro Trojan.DownLoad.9333
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.41441
Cryp_Xed-12 Trend Micro Trojan.Fakealert.11944
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.40697
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7326
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2582
Cryp_Xed-12 Trend Micro Win32.HLLW.Udu
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.6228
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2593
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.10491
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2591
Cryp_Xed-12 Trend Micro Trojan.Proxy.2243
Cryp_Xed-12 Trend Micro Trojan.DownLoader.8658
Cryp_Xed-12 Trend Micro BackDoor.IRC.Sdbot.4647
Cryp_Xed-12 Trend Micro Trojan.DownLoader.8668
Cryp_Xed-12 Trend Micro Win32.HLLW.Multi.2
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.7460
Cryp_Xed-12 Trend Micro BackDoor.Rmt.17
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.18621
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.7443
Cryp_Xed-12 Trend Micro Trojan.MulDrop.30097
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.798
Cryp_Xed-12 Trend Micro BackDoor.IRC.Sdbot.1441
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.21366
Cryp_Xed-12 Trend Micro Trojan.DownLoad.35976
Cryp_Xed-12 Trend Micro Trojan.DownLoader.7131
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.2883
Cryp_Xed-12 Trend Micro Win32.HLLM.MyDoom.529
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.5348
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2987
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.897
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2615
Cryp_Xed-12 Trend Micro Trojan.DownLoad.27942

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies