Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xed-12 aliases:

Name Vendor Dr.Web classification name
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17198
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17227
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17625
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6429
Cryp_Xed-12 Trend Micro Trojan.DownLoader.37543
Cryp_Xed-12 Trend Micro Trojan.PWS.Wsgame.17413
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6317
Cryp_Xed-12 Trend Micro Trojan.DownLoader.12512
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.7058
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.2829
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6463
Cryp_Xed-12 Trend Micro Trojan.Babes
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.6044
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.12478
Cryp_Xed-12 Trend Micro Trojan.DownLoader.12970
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqshou
Cryp_Xed-12 Trend Micro Trojan.Hitpop.49
Cryp_Xed-12 Trend Micro Win32.HLLW.Autoruner.15524
Cryp_Xed-12 Trend Micro Trojan.PWS.Legmir.1502
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.6935
Cryp_Xed-12 Trend Micro Trojan.KeyLogger.483
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.10818
Cryp_Xed-12 Trend Micro Trojan.NtRootKit.401
Cryp_Xed-12 Trend Micro Win32.HLLM.Limar.2216
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24101
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.19500
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.8394
Cryp_Xed-12 Trend Micro Trojan.StartPage.25471
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24171
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24198
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24031
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24149
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24144
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24137
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24014
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24107
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24069
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24257
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24019
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.23751
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24165
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.23995
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.5509
Cryp_Xed-12 Trend Micro Trojan.PWS.Banker.7452
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.23990
Cryp_Xed-12 Trend Micro Trojan.PWS.Qqpass.883
Cryp_Xed-12 Trend Micro Win32.HLLW.MyBot.4669
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.24164
Cryp_Xed-12 Trend Micro Win32.HLLW.Agobot.593
Cryp_Xed-12 Trend Micro Trojan.PWS.Gamania.23904

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.