Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xin1 aliases:

Name Vendor Dr.Web classification name
Cryp_Xin1 Trend Micro Trojan.Sheng.2
Cryp_Xin1 Trend Micro Trojan.DownLoad.39520
Cryp_Xin1 Trend Micro BackDoor.Attack.21
Cryp_Xin1 Trend Micro BackDoor.Pigeon.24598
Cryp_Xin1 Trend Micro Trojan.Ilomo
Cryp_Xin1 Trend Micro Trojan.Gerhant
Cryp_Xin1 Trend Micro Adware.Softomate.105
Cryp_Xin1 Trend Micro Tool.Transmit.3
Cryp_Xin1 Trend Micro BackDoor.Pigeon.17378
Cryp_Xin1 Trend Micro Trojan.Siggen.5076
Cryp_Xin1 Trend Micro Trojan.Click.origin
Cryp_Xin1 Trend Micro Trojan.Siggen.1672
Cryp_Xin1 Trend Micro Trojan.Spambot.4438
Cryp_Xin1 Trend Micro BackDoor.Darkshell.96
Cryp_Xin1 Trend Micro Trojan.Popuper
Cryp_Xin1 Trend Micro Trojan.Proxy.13262
Cryp_Xin1 Trend Micro Trojan.Inject.5537
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22160
Cryp_Xin1 Trend Micro BackDoor.Graybird
Cryp_Xin1 Trend Micro BackDoor.Pigeon.7050
Cryp_Xin1 Trend Micro BackDoor.Rpcs
Cryp_Xin1 Trend Micro Trojan.MulDrop.23514
Cryp_Xin1 Trend Micro Trojan.DownLoad.46401
Cryp_Xin1 Trend Micro BackDoor.Beizhu.2798
Cryp_Xin1 Trend Micro Trojan.DownLoader.47247
Cryp_Xin1 Trend Micro BackDoor.Update.269
Cryp_Xin1 Trend Micro Trojan.Spambot.4729
Cryp_Xin1 Trend Micro Trojan.Packed.166
Cryp_Xin1 Trend Micro BackDoor.Spy.48
Cryp_Xin1 Trend Micro Trojan.MulDrop.29401
Cryp_Xin1 Trend Micro BackDoor.Pigeon.805
Cryp_Xin1 Trend Micro Trojan.Spambot.4426
Cryp_Xin1 Trend Micro Trojan.NtRootKit.1423
Cryp_Xin1 Trend Micro Trojan.MulDrop.16584
Cryp_Xin1 Trend Micro BackDoor.Recaro
Cryp_Xin1 Trend Micro Trojan.PWS.Wsgame.origin
Cryp_Xin1 Trend Micro BackDoor.Update.271
Cryp_Xin1 Trend Micro Trojan.MulDrop1.4647
Cryp_Xin1 Trend Micro BackDoor.Pigeon.41464
Cryp_Xin1 Trend Micro Trojan.DownLoad.39833
Cryp_Xin1 Trend Micro BackDoor.PcClient.856
Cryp_Xin1 Trend Micro Win32.HLLM.MyDoom.540
Cryp_Xin1 Trend Micro Win32.HLLM.MyDoom.542
Cryp_Xin1 Trend Micro Trojan.Inject.3774
Cryp_Xin1 Trend Micro Trojan.DownLoad1.36639
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22887
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22861
Cryp_Xin1 Trend Micro Trojan.MulDrop.29325
Cryp_Xin1 Trend Micro BackDoor.Pigeon.5102
Cryp_Xin1 Trend Micro BackDoor.Pigeon.17263

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.