FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5059
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5161
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5311
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5203
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5189
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5223
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5394
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5321
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.13865
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.1032
Cryp_Xed-12 Trend Micro Win32.HLLW.Kelvin
Cryp_Xed-12 Trend Micro Trojan.DownLoad.40203
Cryp_Xed-12 Trend Micro Trojan.DownLoader.27249
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.16590
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.20154
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.13192
Cryp_Xed-12 Trend Micro Trojan.MulDrop.10904
Cryp_Xed-12 Trend Micro Trojan.MulDrop.10960
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.9887
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.4015
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1927
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3512
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.10411
Cryp_Xed-12 Trend Micro Program.MiniFtp
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5829
Cryp_Xed-12 Trend Micro Trojan.DownLoader.64017
Cryp_Xed-12 Trend Micro Trojan.Popuper.5299
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1160
Cryp_Xed-12 Trend Micro Trojan.Packed.162
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.3263
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4418
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1161
Cryp_Xed-12 Trend Micro Exploit.DCom.308
Cryp_Xed-12 Trend Micro BackDoor.Gament
Cryp_Xed-12 Trend Micro BackDoor.Generic.1553
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.9791
Cryp_Xed-12 Trend Micro Win32.Detox
Cryp_Xed-12 Trend Micro BackDoor.BlackHole.3155
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.42978
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.42736
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.42896
Cryp_Xed-12 Trend Micro Trojan.Fakealert.12174
Cryp_Xed-12 Trend Micro Trojan.Fakealert.12249
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.39219
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.36736
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.41365
Cryp_Xed-12 Trend Micro Trojan.DownLoad.7651
Cryp_Xed-12 Trend Micro Trojan.PWS.Mgame.34
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4496
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11979

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies