Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Bits aliases:

Name Vendor Dr.Web classification name
Cryp_Bits Trend Micro Trojan.Proxy.682
Cryp_Bits Trend Micro Win32.Detox
Cryp_Bits Trend Micro Trojan.DownLoader.6956
Cryp_Bits Trend Micro Trojan.Click.160
Cryp_Bits Trend Micro Trojan.Proxy.665
Cryp_Bits Trend Micro Trojan.Proxy.664
Cryp_Bits Trend Micro Adware.Admilli
Cryp_Bits Trend Micro BackDoor.Haxdoor.443
Cryp_Bits Trend Micro Trojan.Proxy.340
Cryp_Bits Trend Micro Trojan.MulDrop.2120
Cryp_Bits Trend Micro Win32.HLLW.ForBot
Cryp_Bits Trend Micro Trojan.DownLoader.1203
Cryp_Bits Trend Micro Trojan.DownLoader.1138
Cryp_Bits Trend Micro Trojan.DownLoader.52405
Cryp_Bits Trend Micro Trojan.StartPage.256
Cryp_Bits Trend Micro Trojan.Favadd
Cryp_Bits Trend Micro Trojan.DownLoader.24704
Cryp_Bits Trend Micro Trojan.DownLoader.52398
Cryp_Bits Trend Micro Trojan.DownLoader.29966
Cryp_Bits Trend Micro Trojan.DownLoader.45033
Cryp_Bits Trend Micro Trojan.DownLoader.45036
Cryp_Bits Trend Micro Trojan.DownLoader.45038
Cryp_Bits Trend Micro Trojan.MulDrop.8435
Cryp_Bits Trend Micro Trojan.Click.4173
Cryp_Bits Trend Micro Trojan.MulDrop.8563
Cryp_Bits Trend Micro Trojan.DownLoad.2048
Cryp_Bits Trend Micro Trojan.DownLoader.23614
Cryp_Bits Trend Micro Trojan.DownLoader.14130
Cryp_Bits Trend Micro Trojan.Packed.454
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.307
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.313
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.287
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.292
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.301
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.308
Cryp_Bits Trend Micro Trojan.StartPage.437
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.314
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.316
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.310
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.322
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.288
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.303
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.315
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.297
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.291
Cryp_Bits Trend Micro Trojan.PWS.Dosger
Cryp_Bits Trend Micro Trojan.PWS.LDPinch.284
Cryp_Bits Trend Micro Trojan.DownLoader.14301
Cryp_Bits Trend Micro Trojan.DownLoader.11925
Cryp_Bits Trend Micro DDoS.Rincux

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.