Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.DownLoad.27741
Cryp_Xed-12 Trend Micro Trojan.Popuper.14167
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3356
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3702
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.3298
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.1418
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.6161
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.9025
Cryp_Xed-12 Trend Micro Trojan.MulDrop.7186
Cryp_Xed-12 Trend Micro Trojan.DownLoader.6945
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.5067
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.4195
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2399
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.2441
Cryp_Xed-12 Trend Micro Trojan.MulDrop.16200
Cryp_Xed-12 Trend Micro Trojan.MulDrop.15725
Cryp_Xed-12 Trend Micro DDoS.Attack.240
Cryp_Xed-12 Trend Micro Trojan.DownLoader.63821
Cryp_Xed-12 Trend Micro Trojan.DownLoader.62487
Cryp_Xed-12 Trend Micro BackDoor.Pigeon.797
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6305
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6298
Cryp_Xed-12 Trend Micro Trojan.DownLoad.27890
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.10265
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5004
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4820
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.8330
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.7679
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.3540
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.2043
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5341
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5994
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.5990
Cryp_Xed-12 Trend Micro Trojan.DownLoader.34005
Cryp_Xed-12 Trend Micro Trojan.DownLoader.30348
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2095
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.2341
Cryp_Xed-12 Trend Micro BackDoor.Leviat
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5374
Cryp_Xed-12 Trend Micro Trojan.Goner.72
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.11912
Cryp_Xed-12 Trend Micro Trojan.MulDrop.17979
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5092
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4860
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.5298
Cryp_Xed-12 Trend Micro Trojan.DownLoad.3728
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4827
Cryp_Xed-12 Trend Micro Trojan.MulDrop.4501
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.4823
Cryp_Xed-12 Trend Micro Trojan.MulDrop.4485

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.