Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5594
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11620
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.7744
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11908
Cryp_Xed-12 Trend Micro Trojan.Fakealert.191
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11179
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5948
Cryp_Xed-12 Trend Micro Trojan.PWS.QQSender
Cryp_Xed-12 Trend Micro Trojan.DownLoader.11873
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5901
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.11107
Cryp_Xed-12 Trend Micro Trojan.Click.4465
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2430
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.11108
Cryp_Xed-12 Trend Micro Trojan.Click.4459
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqrobber.42
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7387
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2653
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.603
Cryp_Xed-12 Trend Micro Trojan.DownLoader.26560
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.1462
Cryp_Xed-12 Trend Micro Trojan.Click.21821
Cryp_Xed-12 Trend Micro Trojan.Hitpop.1727
Cryp_Xed-12 Trend Micro Trojan.Packed.362
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7544
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.1608
Cryp_Xed-12 Trend Micro Trojan.Cinco
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.12899
Cryp_Xed-12 Trend Micro Win32.HLLW.Kelvin.197
Cryp_Xed-12 Trend Micro Trojan.DownLoad.3730
Cryp_Xed-12 Trend Micro Trojan.MulDrop.33878
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6089
Cryp_Xed-12 Trend Micro Trojan.MulDrop.12600
Cryp_Xed-12 Trend Micro Trojan.DownLoader.47639
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6156
Cryp_Xed-12 Trend Micro Trojan.NtRootKit.922
Cryp_Xed-12 Trend Micro Trojan.MulDrop.18316
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6464
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6309
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6416
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6468
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6319
Cryp_Xed-12 Trend Micro Trojan.DownLoad.1119
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6609
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.12823
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6523
Cryp_Xed-12 Trend Micro Trojan.MulDrop.23116
Cryp_Xed-12 Trend Micro Trojan.DownLoad1.39723
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5599
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.11785

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.