Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.Morphine.B aliases:

Name Vendor Dr.Web classification name
Packer.Morphine.B BitDefender Trojan.Click.3577
Packer.Morphine.B BitDefender Trojan.DownLoader.29569
Packer.Morphine.B BitDefender Trojan.Click.3614
Packer.Morphine.B BitDefender Trojan.BhoBot
Packer.Morphine.B BitDefender Trojan.Packed.158
Packer.Morphine.B BitDefender Trojan.Packed.198
Packer.Morphine.B BitDefender BackDoor.IRC.Sdbot.2418
Packer.Morphine.B BitDefender Trojan.Hooker.21077
Packer.Morphine.B BitDefender BackDoor.Salidol
Packer.Morphine.B BitDefender BackDoor.GSpot.20
Packer.Morphine.B BitDefender BackDoor.IRC.Rizzo
Packer.Morphine.B BitDefender Trojan.PWS.Tanspy.1238
Packer.Morphine.B BitDefender Trojan.Spambot.2488
Packer.Morphine.B BitDefender Trojan.DownLoader.54640
Packer.Morphine.B BitDefender Trojan.PWS.LDPinch.3605
Packer.Morphine.B BitDefender BackDoor.IRC.Juden
Packer.Morphine.B BitDefender Adware.Crew
Packer.Morphine.B BitDefender Trojan.DownLoader.14608
Packer.Morphine.B BitDefender Trojan.DownLoader.14609
Packer.Morphine.B BitDefender BackDoor.Iterator
Packer.Morphine.B BitDefender BackDoor.IRC.Zyklon
Packer.Morphine.B BitDefender Adware.Hotbot
Packer.Morphine.B BitDefender Trojan.DownLoader.21969
Packer.Morphine.B BitDefender Trojan.DownLoader.36494
Packer.Morphine.B BitDefender Win32.HLLM.Reset
Packer.Morphine.B BitDefender Trojan.DownLoader.53023
Packer.Morphine.B BitDefender Trojan.DownLoader.22964
Packer.Morphine.B BitDefender Trojan.PWS.Tanspy.1254
Packer.Morphine.B BitDefender Trojan.PWS.Tanspy.1257
Packer.Morphine.B BitDefender Trojan.DownLoader.32681
Packer.Morphine.B BitDefender Trojan.Fakealert.329
Packer.Morphine.B BitDefender Trojan.PWS.LDPinch.3422
Packer.Morphine.B BitDefender Trojan.DownLoader.21320
Packer.Morphine.B BitDefender Trojan.Click.4559
Packer.Morphine.B BitDefender Trojan.Click.4566
Packer.Morphine.B BitDefender Trojan.Click.4558
Packer.Morphine.B BitDefender BackDoor.Psi
Packer.Morphine.B BitDefender Trojan.Ranky
Packer.Morphine.B BitDefender Trojan.MulDrop.8818
Packer.Morphine.B BitDefender Trojan.DownLoader.26661
Packer.Morphine.B BitDefender Trojan.PWS.Tanspy.1266
Packer.Morphine.B BitDefender Trojan.Packed.494
Packer.Morphine.B BitDefender Trojan.DownLoader.6426
Packer.Morphine.B BitDefender BackDoor.EggDrop.17
Packer.Morphine.B BitDefender Win32.HLLM.Reset.33
Packer.Morphine.B BitDefender Trojan.MulDrop.8793
Packer.Morphine.B BitDefender Trojan.DownLoader.30199
Packer.Morphine.B BitDefender BackDoor.IRC.Sdbot.3653
Packer.Morphine.B BitDefender BackDoor.IRC.Sdbot.3109
Packer.Morphine.B BitDefender Tool.FindPass

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.