FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Spy.4116
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2808
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5852
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8420
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3484
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3923
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4502
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.1153
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.18179
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.6029
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.13010
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.7576
Cryp_Xed-12 Trend Micro Trojan.DownLoader.17386
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.1472
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9102
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.13313
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9456
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9176
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9229
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9459
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7922
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9412
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6022
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.11405
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5372
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4992
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5232
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1784
Cryp_Xed-12 Trend Micro Trojan.Packed.153
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5606
Cryp_Xed-12 Trend Micro Trojan.Fakealert.271
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.19081
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3024
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3039
Cryp_Xed-12 Trend Micro Trojan.Popuper.25483
Cryp_Xed-12 Trend Micro Trojan.Popuper.26775
Cryp_Xed-12 Trend Micro Trojan.Popuper.26023
Cryp_Xed-12 Trend Micro Trojan.Popuper.26618
Cryp_Xed-12 Trend Micro Trojan.Popuper.25756
Cryp_Xed-12 Trend Micro Trojan.Popuper.26668
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.9725
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5044
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3150
Cryp_Xed-12 Trend Micro Trojan.Click.3957
Cryp_Xed-12 Trend Micro Trojan.DownLoader.8516
Cryp_Xed-12 Trend Micro Trojan.MulDrop.18112
Cryp_Xed-12 Trend Micro Trojan.DownLoader.36280
Cryp_Xed-12 Trend Micro Trojan.DownLoader.36882
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3890
Cryp_Xed-12 Trend Micro Trojan.DownLoader.64586

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies