Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xin1 aliases:

Name Vendor Dr.Web classification name
Cryp_Xin1 Trend Micro BAT.Starter.9
Cryp_Xin1 Trend Micro Trojan.DownLoad.45250
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22385
Cryp_Xin1 Trend Micro Trojan.Proxy.5880
Cryp_Xin1 Trend Micro Win32.HLLM.MyDoom.457
Cryp_Xin1 Trend Micro Win32.HLLM.MyDoom.449
Cryp_Xin1 Trend Micro Trojan.DownLoader.62308
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22242
Cryp_Xin1 Trend Micro BackDoor.Wowish
Cryp_Xin1 Trend Micro Trojan.Proxy.1797
Cryp_Xin1 Trend Micro BackDoor.Pigeon.4433
Cryp_Xin1 Trend Micro Trojan.MulDrop.17830
Cryp_Xin1 Trend Micro Win32.HLLW.Autoruner.2567
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22899
Cryp_Xin1 Trend Micro BackDoor.Beizhu.721
Cryp_Xin1 Trend Micro Trojan.Siggen1.6053
Cryp_Xin1 Trend Micro Win32.HLLW.Autoruner.14616
Cryp_Xin1 Trend Micro Trojan.PWS.LDPinch.4611
Cryp_Xin1 Trend Micro Trojan.NtRootKit.6279
Cryp_Xin1 Trend Micro Trojan.NtRootKit.6209
Cryp_Xin1 Trend Micro Trojan.NtRootKit.6243
Cryp_Xin1 Trend Micro Trojan.NtRootKit.6273
Cryp_Xin1 Trend Micro Trojan.NtRootKit.6253
Cryp_Xin1 Trend Micro Trojan.NtRootKit.6262
Cryp_Xin1 Trend Micro Trojan.DownLoad.4691
Cryp_Xin1 Trend Micro Trojan.DownLoader.origin
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22893
Cryp_Xin1 Trend Micro BackDoor.Pigeon.22923
Cryp_Xin1 Trend Micro BackDoor.Pigeon.11728
Cryp_Xin1 Trend Micro Trojan.PWS.LDPinch.7690
Cryp_Xin1 Trend Micro Trojan.Click.45947
Cryp_Xin1 Trend Micro Trojan.DownLoad1.40330
Cryp_Xin1 Trend Micro Trojan.KeyLogger.2053
Cryp_Xin1 Trend Micro Trojan.NtRootKit.9391
Cryp_Xin1 Trend Micro Trojan.NtRootKit.9390
Cryp_Xin1 Trend Micro Trojan.Darkshell.179
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.456
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.348
Cryp_Xin1 Trend Micro Trojan.PWS.Stealer.271
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.343
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.342
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.354
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.339
Cryp_Xin1 Trend Micro Trojan.Packed.21141
Cryp_Xin1 Trend Micro BackDoor.Qbot.19
Cryp_Xin1 Trend Micro Trojan.Hashish.3
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.600
Cryp_Xin1 Trend Micro Trojan.NtRootKit.9822
Cryp_Xin1 Trend Micro Trojan.Siggen1.63070
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.400

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.