Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Morphine aliases:

Name Vendor Dr.Web classification name
Cryp_Morphine Trend Micro BackDoor.IRC.Wisdom
Cryp_Morphine Trend Micro Trojan.Aimlink
Cryp_Morphine Trend Micro BackDoor.IRC.Sdbot.63
Cryp_Morphine Trend Micro BackDoor.HackDef.359
Cryp_Morphine Trend Micro Win32.HLLM.Netsky.based
Cryp_Morphine Trend Micro Trojan.Packed.140
Cryp_Morphine Trend Micro BackDoor.Salidol
Cryp_Morphine Trend Micro Trojan.DownLoader.1202
Cryp_Morphine Trend Micro BackDoor.Netset
Cryp_Morphine Trend Micro BackDoor.SlimFTPd.316
Cryp_Morphine Trend Micro BackDoor.Redkod.14
Cryp_Morphine Trend Micro BackDoor.IRC.Sdbot.2418
Cryp_Morphine Trend Micro Trojan.Ranky
Cryp_Morphine Trend Micro Win32.IRC.Bot.based
Cryp_Morphine Trend Micro Win32.HLLW.Agobot
Cryp_Morphine Trend Micro Win32.HLLW.MyBot.based
Cryp_Morphine Trend Micro Trojan.Hooker.21077
Cryp_Morphine Trend Micro Trojan.Packed.198
Cryp_Morphine Trend Micro Trojan.Click.4052
Cryp_Morphine Trend Micro Trojan.Click.4054
Cryp_Morphine Trend Micro Trojan.Click.3620
Cryp_Morphine Trend Micro Trojan.Click.3577
Cryp_Morphine Trend Micro Trojan.BhoBot
Cryp_Morphine Trend Micro Trojan.Click.3619
Cryp_Morphine Trend Micro Trojan.MulDrop.8321
Cryp_Morphine Trend Micro Trojan.MulDrop.8468
Cryp_Morphine Trend Micro Trojan.MulDrop.8465
Cryp_Morphine Trend Micro Trojan.MulDrop.8456
Cryp_Morphine Trend Micro Trojan.MulDrop.8451
Cryp_Morphine Trend Micro Trojan.LowZones
Cryp_Morphine Trend Micro Trojan.Click.16929
Cryp_Morphine Trend Micro BackDoor.EggDrop
Cryp_Morphine Trend Micro BackDoor.Vidro
Cryp_Morphine Trend Micro Trojan.PWS.Tanspy
Cryp_Morphine Trend Micro Trojan.DownLoader.29569
Cryp_Morphine Trend Micro Trojan.Winhelp
Cryp_Morphine Trend Micro BackDoor.IRC.Sdbot.470
Cryp_Morphine Trend Micro BackDoor.IRC.Sdbot.2219
Cryp_Morphine Trend Micro BackDoor.HackDef.238
Cryp_Morphine Trend Micro Trojan.DownLoader.14609
Cryp_Morphine Trend Micro Trojan.Sfind.185
Cryp_Morphine Trend Micro Trojan.Troll
Cryp_Morphine Trend Micro BackDoor.RemoteShell.37
Cryp_Morphine Trend Micro Win32.HLLW.MyBot
Cryp_Morphine Trend Micro Trojan.PWS.Barrior
Cryp_Morphine Trend Micro Win32.HLLW.ForBot
Cryp_Morphine Trend Micro Win32.HLLW.SpyBot
Cryp_Morphine Trend Micro BackDoor.IRC.Shiznic
Cryp_Morphine Trend Micro BackDoor.IRC.Jbbot.21
Cryp_Morphine Trend Micro Win32.HLLW.Bauka

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.