Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Crypt.DT aliases:

Name Vendor Dr.Web classification name
Trojan.Crypt.DT BitDefender Trojan.MulDrop.3429
Trojan.Crypt.DT BitDefender Trojan.DownLoader.57152
Trojan.Crypt.DT BitDefender Trojan.MulDrop.4989
Trojan.Crypt.DT BitDefender Trojan.DownLoader.30187
Trojan.Crypt.DT BitDefender Trojan.Click.1679
Trojan.Crypt.DT BitDefender Trojan.MulDrop.3949
Trojan.Crypt.DT BitDefender Trojan.MulDrop.877
Trojan.Crypt.DT BitDefender Trojan.MulDrop.15489
Trojan.Crypt.DT BitDefender Trojan.MulDrop.4293
Trojan.Crypt.DT BitDefender Trojan.DownLoader.20378
Trojan.Crypt.DT BitDefender Trojan.DownLoader.26661
Trojan.Crypt.DT BitDefender Trojan.MulDrop.23267
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1094
Trojan.Crypt.DT BitDefender Trojan.DnsChange
Trojan.Crypt.DT BitDefender Tool.ICQFlood
Trojan.Crypt.DT BitDefender Trojan.Packed.162
Trojan.Crypt.DT BitDefender Trojan.DownLoader.43059
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1216
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1129
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1315
Trojan.Crypt.DT BitDefender BackDoor.Rejoice.43
Trojan.Crypt.DT BitDefender Trojan.DownLoader.20698
Trojan.Crypt.DT BitDefender Trojan.MulDrop.11817
Trojan.Crypt.DT BitDefender Trojan.MulDrop.11230
Trojan.Crypt.DT BitDefender Trojan.Packed.170
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1407
Trojan.Crypt.DT BitDefender Trojan.DownLoader.20310
Trojan.Crypt.DT BitDefender Trojan.DownLoader.21094
Trojan.Crypt.DT BitDefender BackDoor.Pigeon.11206
Trojan.Crypt.DT BitDefender Trojan.PWS.Gamania.9460
Trojan.Crypt.DT BitDefender Trojan.MulDrop.4263
Trojan.Crypt.DT BitDefender Trojan.DownLoader.47504
Trojan.Crypt.DT BitDefender Trojan.DownLoader.21527
Trojan.Crypt.DT BitDefender Trojan.DownLoader.18400
Trojan.Crypt.DT BitDefender BackDoor.Pigeon.8067
Trojan.Crypt.DT BitDefender BackDoor.Pigeon.13257
Trojan.Crypt.DT BitDefender Trojan.MulDrop.6390
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1383
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1639
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1667
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1668
Trojan.Crypt.DT BitDefender Trojan.PWS.LDPinch.1692
Trojan.Crypt.DT BitDefender Trojan.MulDrop.5820
Trojan.Crypt.DT BitDefender Trojan.PWS.Qqpass.400
Trojan.Crypt.DT BitDefender Trojan.PWS.Legmir.2025
Trojan.Crypt.DT BitDefender Trojan.DownLoader.20866
Trojan.Crypt.DT BitDefender Trojan.MulDrop.9330
Trojan.Crypt.DT BitDefender Trojan.DownLoader.14827
Trojan.Crypt.DT BitDefender Trojan.DownLoader.46622
Trojan.Crypt.DT BitDefender Trojan.DownLoader.46720

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.