Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1430
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.9079
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5234
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5083
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5326
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5099
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1423
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5055
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5345
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5101
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5275
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17787
Cryp_Xed-12 Trend Micro Trojan.DownLoad.3942
Cryp_Xed-12 Trend Micro Trojan.DownLoader.42637
Cryp_Xed-12 Trend Micro Trojan.DownLoader.9262
Cryp_Xed-12 Trend Micro Trojan.MulDrop.8743
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.15204
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.7176
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29419
Cryp_Xed-12 Trend Micro Trojan.DownLoader.59704
Cryp_Xed-12 Trend Micro Trojan.MulDrop.11165
Cryp_Xed-12 Trend Micro Trojan.MulDrop.3998
Cryp_Xed-12 Trend Micro Trojan.MulDrop.12328
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.11699
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11142
Cryp_Xed-12 Trend Micro Trojan.DownLoader.26821
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11284
Cryp_Xed-12 Trend Micro Trojan.DownLoader.26845
Cryp_Xed-12 Trend Micro Trojan.MulDrop.32019
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.22350
Cryp_Xed-12 Trend Micro Trojan.Inject.5760
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7668
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.16144
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.383
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.1215
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.312
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3264
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5757
Cryp_Xed-12 Trend Micro Trojan.Click.4517
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5196
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5076
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5178
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29564
Cryp_Xed-12 Trend Micro Trojan.Click.4457
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5287
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5324
Cryp_Xed-12 Trend Micro Trojan.Click.4464
Cryp_Xed-12 Trend Micro Trojan.Click.4523
Cryp_Xed-12 Trend Micro Trojan.Click.4460
Cryp_Xed-12 Trend Micro Trojan.DownLoad.29333

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.