Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5482
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4536
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5533
Cryp_Xed-12 Trend Micro Trojan.DownLoader.17773
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.7405
Cryp_Xed-12 Trend Micro Trojan.Hitpop.1930
Cryp_Xed-12 Trend Micro Trojan.MulDrop.30391
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.13076
Cryp_Xed-12 Trend Micro Trojan.DownLoad.36343
Cryp_Xed-12 Trend Micro Trojan.DownLoader.30840
Cryp_Xed-12 Trend Micro Trojan.MulDrop.18399
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5956
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2157
Cryp_Xed-12 Trend Micro Trojan.BhoSpy.19
Cryp_Xed-12 Trend Micro Trojan.PWS.Hangame.808
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.13151
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2297
Cryp_Xed-12 Trend Micro Trojan.DownLoader.37104
Cryp_Xed-12 Trend Micro Trojan.Bizten.18971
Cryp_Xed-12 Trend Micro Trojan.Hitpop.2101
Cryp_Xed-12 Trend Micro Trojan.MulDrop.29241
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.4319
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2590
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.20099
Cryp_Xed-12 Trend Micro Win32.HLLW.Ressdt.77
Cryp_Xed-12 Trend Micro Trojan.DownLoader.8709
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7873
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7877
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7654
Cryp_Xed-12 Trend Micro Trojan.PWS.Lineage.7633
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5852
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.18179
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.7576
Cryp_Xed-12 Trend Micro Trojan.DownLoader.17386
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9176
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9229
Cryp_Xed-12 Trend Micro Trojan.MulDrop.9459
Cryp_Xed-12 Trend Micro Trojan.Popuper.26023
Cryp_Xed-12 Trend Micro Trojan.Popuper.26668
Cryp_Xed-12 Trend Micro Trojan.MulDrop.5044
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.3150
Cryp_Xed-12 Trend Micro Trojan.Inject.570
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2076
Cryp_Xed-12 Trend Micro Trojan.DownLoad.37496
Cryp_Xed-12 Trend Micro BackDoor.Foodler
Cryp_Xed-12 Trend Micro BackDoor.Scorpion
Cryp_Xed-12 Trend Micro Trojan.Proxy.1832
Cryp_Xed-12 Trend Micro Trojan.DownLoader.49484
Cryp_Xed-12 Trend Micro Trojan.Proxy.1855
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.3428

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.