Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xin1 aliases:

Name Vendor Dr.Web classification name
Cryp_Xin1 Trend Micro BackDoor.Beizhu.941
Cryp_Xin1 Trend Micro Win32.IRC.Bot
Cryp_Xin1 Trend Micro BackDoor.IRC.Sdbot.4302
Cryp_Xin1 Trend Micro Dialer.Accessor
Cryp_Xin1 Trend Micro Trojan.MulDrop.10945
Cryp_Xin1 Trend Micro Trojan.PWS.LDPinch.4407
Cryp_Xin1 Trend Micro Trojan.Siggen.56463
Cryp_Xin1 Trend Micro Trojan.PWS.GoldSpy.2553
Cryp_Xin1 Trend Micro Trojan.DownLoader.42627
Cryp_Xin1 Trend Micro BackDoor.Huai.5819
Cryp_Xin1 Trend Micro Trojan.DownLoad1.38070
Cryp_Xin1 Trend Micro Trojan.DownLoad1.35677
Cryp_Xin1 Trend Micro BackDoor.Pigeon.11939
Cryp_Xin1 Trend Micro BackDoor.Nuclear.117
Cryp_Xin1 Trend Micro Trojan.MulDrop.18227
Cryp_Xin1 Trend Micro BackDoor.Beizhu.370
Cryp_Xin1 Trend Micro BackDoor.PcClient
Cryp_Xin1 Trend Micro BackDoor.Spy.39
Cryp_Xin1 Trend Micro BackDoor.Pigeon.9337
Cryp_Xin1 Trend Micro BackDoor.Huai.5814
Cryp_Xin1 Trend Micro BackDoor.Darkshell.71
Cryp_Xin1 Trend Micro Trojan.Packed.249
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22740
Cryp_Xin1 Trend Micro BackDoor.Hbeat.146
Cryp_Xin1 Trend Micro BackDoor.Pigeon.9671
Cryp_Xin1 Trend Micro BackDoor.Klj
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25015
Cryp_Xin1 Trend Micro Trojan.DownLoad.38384
Cryp_Xin1 Trend Micro Trojan.DownLoad1.42816
Cryp_Xin1 Trend Micro Trojan.KeyLogger.5734
Cryp_Xin1 Trend Micro BackDoor.Pigeon.23646
Cryp_Xin1 Trend Micro Trojan.DownLoad.3293
Cryp_Xin1 Trend Micro Trojan.MulDrop.32549
Cryp_Xin1 Trend Micro Trojan.Proxy.2499
Cryp_Xin1 Trend Micro BackDoor.Huai.5956
Cryp_Xin1 Trend Micro Trojan.PWS.LDPinch.4132
Cryp_Xin1 Trend Micro BackDoor.Pigeon.8072
Cryp_Xin1 Trend Micro Trojan.MulDrop.33902
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21219
Cryp_Xin1 Trend Micro BackDoor.Beizhu.2768
Cryp_Xin1 Trend Micro BackDoor.Siggen.572
Cryp_Xin1 Trend Micro Trojan.Inject.549
Cryp_Xin1 Trend Micro BackDoor.Pigeon.2486
Cryp_Xin1 Trend Micro Trojan.DownLoad1.36155
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21328
Cryp_Xin1 Trend Micro BackDoor.Mjc
Cryp_Xin1 Trend Micro BackDoor.Pigeon.3010
Cryp_Xin1 Trend Micro Win32.HLLW.Shadow
Cryp_Xin1 Trend Micro Trojan.MulDrop.32869
Cryp_Xin1 Trend Micro Trojan.Inject.632

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.