Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Xin1 aliases:

Name Vendor Dr.Web classification name
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.436
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.373
Cryp_Xin1 Trend Micro Win32.HLLW.Autoruner.8072
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25943
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25883
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25868
Cryp_Xin1 Trend Micro BackDoor.Pigeon.25711
Cryp_Xin1 Trend Micro BackDoor.Pigeon.21007
Cryp_Xin1 Trend Micro Trojan.MulDrop.37160
Cryp_Xin1 Trend Micro Trojan.Siggen1.63691
Cryp_Xin1 Trend Micro Trojan.NtRootKit.3965
Cryp_Xin1 Trend Micro Trojan.PWS.Spy.1821
Cryp_Xin1 Trend Micro Trojan.DownLoad.53018
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.418
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.370
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.389
Cryp_Xin1 Trend Micro BackDoor.Siggen.3486
Cryp_Xin1 Trend Micro BackDoor.Pigeon.27629
Cryp_Xin1 Trend Micro Trojan.MulDrop.35198
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.428
Cryp_Xin1 Trend Micro BackDoor.Pigeon.26937
Cryp_Xin1 Trend Micro BackDoor.Pigeon.26963
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.398
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.413
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.376
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.552
Cryp_Xin1 Trend Micro Trojan.NtRootKit.5118
Cryp_Xin1 Trend Micro Trojan.DownLoader1.38581
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.533
Cryp_Xin1 Trend Micro BackDoor.Pigeon.26133
Cryp_Xin1 Trend Micro Trojan.DownLoader1.29567
Cryp_Xin1 Trend Micro Trojan.Proxy.11339
Cryp_Xin1 Trend Micro Trojan.MulDrop.11114
Cryp_Xin1 Trend Micro Trojan.DownLoader1.34943
Cryp_Xin1 Trend Micro BackDoor.Pigeon.7352
Cryp_Xin1 Trend Micro Trojan.NtRootKit.4018
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.426
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.407
Cryp_Xin1 Trend Micro Trojan.PWS.Panda.405
Cryp_Xin1 Trend Micro BackDoor.Pigeon.14534

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.