Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Crypt.BH aliases:

Name Vendor Dr.Web classification name
Trojan.Crypt.BH BitDefender Trojan.MulDrop.12389
Trojan.Crypt.BH BitDefender Trojan.MulDrop.14080
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.10
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.831
Trojan.Crypt.BH BitDefender Trojan.Inject.290
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.740
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.660
Trojan.Crypt.BH BitDefender Trojan.PWS.Lineage.4471
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.106
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.73
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.65
Trojan.Crypt.BH BitDefender Trojan.MulDrop.13756
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.473
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.48
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.517
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.51
Trojan.Crypt.BH BitDefender BackDoor.Pigeon.6620
Trojan.Crypt.BH BitDefender Trojan.MulDrop.10481
Trojan.Crypt.BH BitDefender Trojan.MulDrop.16877
Trojan.Crypt.BH BitDefender Trojan.MulDrop.3336
Trojan.Crypt.BH BitDefender BackDoor.Bifrost
Trojan.Crypt.BH BitDefender Trojan.Proxy.993
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.692
Trojan.Crypt.BH BitDefender Trojan.MulDrop.5946
Trojan.Crypt.BH BitDefender BackDoor.Pigeon.7873
Trojan.Crypt.BH BitDefender Trojan.MulDrop.1494
Trojan.Crypt.BH BitDefender Trojan.MulDrop.12958
Trojan.Crypt.BH BitDefender BackDoor.Pigeon.7881
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.479
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.829
Trojan.Crypt.BH BitDefender Trojan.MulDrop.3768
Trojan.Crypt.BH BitDefender Trojan.MulDrop.8803
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.796
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.756
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.659
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.515
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.66
Trojan.Crypt.BH BitDefender BackDoor.Pigeon
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.637
Trojan.Crypt.BH BitDefender Trojan.MulDrop.9787
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.624
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.571
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.675
Trojan.Crypt.BH BitDefender Trojan.MulDrop.1284
Trojan.Crypt.BH BitDefender Trojan.MulDrop.12159
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.26
Trojan.Crypt.BH BitDefender Trojan.MulDrop.3429
Trojan.Crypt.BH BitDefender BackDoor.Bifrost.56
Trojan.Crypt.BH BitDefender Trojan.MulDrop.7665
Trojan.Crypt.BH BitDefender Trojan.MulDrop.17696

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.