Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xin1 aliases:

Name Vendor Dr.Web classification name
Cryp_Xin1 Trend Micro BackDoor.Pigeon.origin
Cryp_Xin1 Trend Micro Trojan.Proxy.3766
Cryp_Xin1 Trend Micro BackDoor.Pigeon.11438
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5314
Cryp_Xin1 Trend Micro BackDoor.Pigeon.4040
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5085
Cryp_Xin1 Trend Micro BackDoor.Pigeon.4790
Cryp_Xin1 Trend Micro BackDoor.Pigeon.4043
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5084
Cryp_Xin1 Trend Micro Trojan.Packed.147
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5319
Cryp_Xin1 Trend Micro Trojan.DownLoader.18993
Cryp_Xin1 Trend Micro Trojan.DownLoader.25702
Cryp_Xin1 Trend Micro BackDoor.Pigeon.6328
Cryp_Xin1 Trend Micro BackDoor.Skullboy
Cryp_Xin1 Trend Micro BackDoor.Pigeon.7204
Cryp_Xin1 Trend Micro Trojan.Spambot.2384
Cryp_Xin1 Trend Micro BackDoor.Pigeon.8080
Cryp_Xin1 Trend Micro BackDoor.Pigeon.7768
Cryp_Xin1 Trend Micro BackDoor.Pigeon.6671
Cryp_Xin1 Trend Micro Trojan.Spambot.4234
Cryp_Xin1 Trend Micro Trojan.Spambot.4233
Cryp_Xin1 Trend Micro Win32.HLLW.Shadow.1
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5925
Cryp_Xin1 Trend Micro BackDoor.Pigeon.6001
Cryp_Xin1 Trend Micro Trojan.PWS.Lineage.3003
Cryp_Xin1 Trend Micro BackDoor.Pigeon.1021
Cryp_Xin1 Trend Micro BackDoor.Pigeon.6755
Cryp_Xin1 Trend Micro BackDoor.Pigeon.6285
Cryp_Xin1 Trend Micro Trojan.Spambot.2394
Cryp_Xin1 Trend Micro Trojan.Spambot.2496
Cryp_Xin1 Trend Micro BackDoor.Pigeon.8547
Cryp_Xin1 Trend Micro Trojan.Spambot.2490
Cryp_Xin1 Trend Micro Trojan.Proxy.2326
Cryp_Xin1 Trend Micro Trojan.Spambot.2486
Cryp_Xin1 Trend Micro BackDoor.Pigeon.8286
Cryp_Xin1 Trend Micro Trojan.PWS.LDPinch.2488
Cryp_Xin1 Trend Micro Trojan.Packed.201
Cryp_Xin1 Trend Micro Trojan.DownLoader.36533
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21202
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21183
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21194
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21198
Cryp_Xin1 Trend Micro Trojan.Zufyxent
Cryp_Xin1 Trend Micro Trojan.PWS.Qqpass.1121
Cryp_Xin1 Trend Micro Trojan.Spambot.2499
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21061
Cryp_Xin1 Trend Micro BackDoor.Pigeon.20805
Cryp_Xin1 Trend Micro BackDoor.Pigeon.14904
Cryp_Xin1 Trend Micro BackDoor.Pigeon.20445

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.