Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8533
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3888
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4070
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5388
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3199
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3516
Cryp_Xed-12 Trend Micro Trojan.DownLoad.1123
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4200
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3913
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8968
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4435
Cryp_Xed-12 Trend Micro Trojan.DownLoad.3121
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4072
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4358
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4030
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7853
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.6210
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5094
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4347
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4813
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4394
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4199
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4850
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6479
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5283
Cryp_Xed-12 Trend Micro Trojan.DownLoader.9964
Cryp_Xed-12 Trend Micro Trojan.PWS.LDPinch.3589
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.6535
Cryp_Xed-12 Trend Micro Trojan.Popuper
Cryp_Xed-12 Trend Micro Trojan.NtRootKit.162
Cryp_Xed-12 Trend Micro Trojan.DownLoad.1114
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.5382
Cryp_Xed-12 Trend Micro Trojan.DownLoad.4258
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.5493
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.4074
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.39088
Cryp_Xed-12 Trend Micro Trojan.DownLoad.9548
Cryp_Xed-12 Trend Micro Trojan.DownLoad.9754
Cryp_Xed-12 Trend Micro Trojan.DownLoader.19235
Cryp_Xed-12 Trend Micro Trojan.DownLoad.22431
Cryp_Xed-12 Trend Micro Trojan.DownLoad.7586
Cryp_Xed-12 Trend Micro Trojan.PurityAd.287
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.9934
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4071
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.11015
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.11679
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.9884
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.10202
Cryp_Xed-12 Trend Micro Trojan.MulDrop.28249
Cryp_Xed-12 Trend Micro Trojan.DownLoader.55816

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.