Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xin1 aliases:

Name Vendor Dr.Web classification name
Cryp_Xin1 Trend Micro BackDoor.Pigeon.57486
Cryp_Xin1 Trend Micro BackDoor.Pigeon.28420
Cryp_Xin1 Trend Micro Adware.Baidu.2874
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25503
Cryp_Xin1 Trend Micro Trojan.PWS.Gamania.20811
Cryp_Xin1 Trend Micro BackDoor.Pigeon.57487
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25528
Cryp_Xin1 Trend Micro Trojan.DownLoad2.17606
Cryp_Xin1 Trend Micro Trojan.MulDrop.31437
Cryp_Xin1 Trend Micro Trojan.NtRootKit.3957
Cryp_Xin1 Trend Micro Trojan.DownLoad.56541
Cryp_Xin1 Trend Micro Trojan.Siggen.30176
Cryp_Xin1 Trend Micro BackDoor.Pigeon.27215
Cryp_Xin1 Trend Micro BackDoor.Poison.3508
Cryp_Xin1 Trend Micro Trojan.NtRootKit.4956
Cryp_Xin1 Trend Micro BackDoor.Pigeon.43975
Cryp_Xin1 Trend Micro Trojan.DownLoad.46081
Cryp_Xin1 Trend Micro BackDoor.Pigeon.57176
Cryp_Xin1 Trend Micro Trojan.DownLoad.51525
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.382
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.393
Cryp_Xin1 Trend Micro Trojan.PWS.Wsgame.13370
Cryp_Xin1 Trend Micro Trojan.NtRootKit.3937
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25423
Cryp_Xin1 Trend Micro Trojan.Siggen1.63158
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25486
Cryp_Xin1 Trend Micro BackDoor.PcClient.924
Cryp_Xin1 Trend Micro BackDoor.Pigeon.26786
Cryp_Xin1 Trend Micro BackDoor.Siggen.25086
Cryp_Xin1 Trend Micro Adware.Siggen.467
Cryp_Xin1 Trend Micro Trojan.NtRootKit.9668
Cryp_Xin1 Trend Micro BackDoor.Zbot.28
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.401
Cryp_Xin1 Trend Micro Trojan.DownLoader1.38572
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25779
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25635
Cryp_Xin1 Trend Micro BackDoor.Pigeon.57568
Cryp_Xin1 Trend Micro Trojan.AVKill.912
Cryp_Xin1 Trend Micro BackDoor.BlackHole.3834
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.540
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25757
Cryp_Xin1 Trend Micro Trojan.Raber.431
Cryp_Xin1 Trend Micro BackDoor.Poison.686
Cryp_Xin1 Trend Micro Trojan.NtRootKit.4001
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.532
Cryp_Xin1 Trend Micro Trojan.NtRootKit.5064
Cryp_Xin1 Trend Micro Trojan.NtRootKit.3683
Cryp_Xin1 Trend Micro Trojan.NtRootKit.3990
Cryp_Xin1 Trend Micro BackDoor.Pigeon.11749
Cryp_Xin1 Trend Micro Trojan.DownLoader1.39337

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.