Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Nsanti-X aliases:

Name Vendor Dr.Web classification name
Cryp_Nsanti-X Trend Micro Trojan.PWS.Gamania.9254
Cryp_Nsanti-X Trend Micro Trojan.Qqlog
Cryp_Nsanti-X Trend Micro Trojan.PWS.Gamania.17316
Cryp_Nsanti-X Trend Micro BackDoor.IRC.Sdbot.699
Cryp_Nsanti-X Trend Micro Trojan.PWS.Gamania.4449
Cryp_Nsanti-X Trend Micro BackDoor.Aphex.10
Cryp_Nsanti-X Trend Micro BackDoor.Rejoice
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.8702
Cryp_Nsanti-X Trend Micro BackDoor.Huai.5389
Cryp_Nsanti-X Trend Micro Win32.HLLW.Nugache
Cryp_Nsanti-X Trend Micro BackDoor.Beizhu.2376
Cryp_Nsanti-X Trend Micro Trojan.PWS.Vipgsm
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.789
Cryp_Nsanti-X Trend Micro Trojan.PWS.Wsgame.4194
Cryp_Nsanti-X Trend Micro Trojan.PWS.Gamania.7926
Cryp_Nsanti-X Trend Micro Trojan.DownLoader.35134
Cryp_Nsanti-X Trend Micro Trojan.MulDrop.31693
Cryp_Nsanti-X Trend Micro BackDoor.Wolf.16
Cryp_Nsanti-X Trend Micro Trojan.DownLoader.34697
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.9834
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.8179
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.11463
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.8819
Cryp_Nsanti-X Trend Micro Trojan.DownLoader.55040
Cryp_Nsanti-X Trend Micro BackDoor.Rpcs.78
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.8949
Cryp_Nsanti-X Trend Micro BackDoor.HackDef.412
Cryp_Nsanti-X Trend Micro Trojan.Packed.487
Cryp_Nsanti-X Trend Micro Trojan.DownLoader.63799
Cryp_Nsanti-X Trend Micro Trojan.MulDrop.12363
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.17279
Cryp_Nsanti-X Trend Micro Trojan.Cipher.146
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.2254
Cryp_Nsanti-X Trend Micro Trojan.Inject.89
Cryp_Nsanti-X Trend Micro BackDoor.Graybird
Cryp_Nsanti-X Trend Micro Trojan.Fakealert.4345
Cryp_Nsanti-X Trend Micro Trojan.PWS.Qqpass.1921
Cryp_Nsanti-X Trend Micro Trojan.PWS.Banker.12840
Cryp_Nsanti-X Trend Micro Win32.HLLW.Autoruner.2748
Cryp_Nsanti-X Trend Micro Trojan.PWS.Qqpass.1263
Cryp_Nsanti-X Trend Micro Trojan.DownLoader.51070
Cryp_Nsanti-X Trend Micro Trojan.Fakealert.4332
Cryp_Nsanti-X Trend Micro Trojan.NtRootKit.1045
Cryp_Nsanti-X Trend Micro BackDoor.Huai.5775
Cryp_Nsanti-X Trend Micro BackDoor.Swz
Cryp_Nsanti-X Trend Micro BackDoor.Beizhu.2487
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.7078
Cryp_Nsanti-X Trend Micro BackDoor.Huai.1586
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.254
Cryp_Nsanti-X Trend Micro BackDoor.Pigeon.8028

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.