Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xin1 aliases:

Name Vendor Dr.Web classification name
Cryp_Xin1 Trend Micro Trojan.Spambot.3202
Cryp_Xin1 Trend Micro Trojan.Inject.3028
Cryp_Xin1 Trend Micro BackDoor.FireOn
Cryp_Xin1 Trend Micro Trojan.Spambot.3208
Cryp_Xin1 Trend Micro Trojan.DownLoader.61691
Cryp_Xin1 Trend Micro Trojan.Inject.3330
Cryp_Xin1 Trend Micro Trojan.Inject.3415
Cryp_Xin1 Trend Micro Trojan.Havedo.590
Cryp_Xin1 Trend Micro Trojan.Inject.3326
Cryp_Xin1 Trend Micro Trojan.PWS.Lich
Cryp_Xin1 Trend Micro Trojan.DownLoader.47348
Cryp_Xin1 Trend Micro Win32.HLLW.Autoruner.6650
Cryp_Xin1 Trend Micro Trojan.MulDrop.13628
Cryp_Xin1 Trend Micro Trojan.MulDrop.13802
Cryp_Xin1 Trend Micro Trojan.MulDrop.11672
Cryp_Xin1 Trend Micro BackDoor.Pigeon.9045
Cryp_Xin1 Trend Micro BackDoor.Pigeon.2585
Cryp_Xin1 Trend Micro BackDoor.Webex.14
Cryp_Xin1 Trend Micro Trojan.PWS.Swz.15
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5169
Cryp_Xin1 Trend Micro BackDoor.Pigeon.2962
Cryp_Xin1 Trend Micro BackDoor.Huai.1534
Cryp_Xin1 Trend Micro BackDoor.Pigeon.4882
Cryp_Xin1 Trend Micro BackDoor.Pigeon.7351
Cryp_Xin1 Trend Micro BackDoor.Pigeon.4349
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5406
Cryp_Xin1 Trend Micro Trojan.Spambot.3379
Cryp_Xin1 Trend Micro Trojan.Spambot.3433
Cryp_Xin1 Trend Micro Trojan.Spambot.3377
Cryp_Xin1 Trend Micro Trojan.Spambot.3351
Cryp_Xin1 Trend Micro Trojan.Proxy.3302
Cryp_Xin1 Trend Micro Trojan.Packed.504
Cryp_Xin1 Trend Micro BackDoor.Pigeon.7174
Cryp_Xin1 Trend Micro BackDoor.Pigeon.13123
Cryp_Xin1 Trend Micro Trojan.DownLoader.38511
Cryp_Xin1 Trend Micro Trojan.DownLoader.63184
Cryp_Xin1 Trend Micro BackDoor.Pigeon.10902
Cryp_Xin1 Trend Micro BackDoor.Remote.37
Cryp_Xin1 Trend Micro BackDoor.Beizhu.589
Cryp_Xin1 Trend Micro Trojan.NtRootKit.2880
Cryp_Xin1 Trend Micro BackDoor.Pigeon.11856
Cryp_Xin1 Trend Micro BackDoor.Pigeon.6620
Cryp_Xin1 Trend Micro Trojan.DownLoad.3254
Cryp_Xin1 Trend Micro Trojan.Proxy.3749
Cryp_Xin1 Trend Micro Trojan.Proxy.3750
Cryp_Xin1 Trend Micro Trojan.DownLoader.50675
Cryp_Xin1 Trend Micro BackDoor.Fanchi
Cryp_Xin1 Trend Micro BackDoor.Winsck
Cryp_Xin1 Trend Micro Trojan.DownLoad.3770
Cryp_Xin1 Trend Micro Trojan.MulDrop.14555

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.