Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Crypt.TPM.Gen aliases:

Name Vendor Dr.Web classification name
TR/Crypt.TPM.Gen Avira Trojan.Inject.5089
TR/Crypt.TPM.Gen Avira BackDoor.Poison.1021
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.4689
TR/Crypt.TPM.Gen Avira Win32.HLLW.Autoruner.6363
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.4690
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.1355
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.1405
TR/Crypt.TPM.Gen Avira BackDoor.Inge
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2673
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.841
TR/Crypt.TPM.Gen Avira Win32.HLLW.MyBot
TR/Crypt.TPM.Gen Avira Program.Ardamax.169
TR/Crypt.TPM.Gen Avira BackDoor.Bifrost.831
TR/Crypt.TPM.Gen Avira Win32.HLLM.Beagle.45113
TR/Crypt.TPM.Gen Avira Trojan.DownLoader.36035
TR/Crypt.TPM.Gen Avira Trojan.DownLoader.30248
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2602
TR/Crypt.TPM.Gen Avira Trojan.EmailSpy
TR/Crypt.TPM.Gen Avira Win32.HLLW.MyBot.70
TR/Crypt.TPM.Gen Avira Win32.IRC.Bot
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2227
TR/Crypt.TPM.Gen Avira Trojan.DownLoader.26661
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2159
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2742
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.3862
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2061
TR/Crypt.TPM.Gen Avira Trojan.DownLoader.28769
TR/Crypt.TPM.Gen Avira Trojan.MulDrop.9196
TR/Crypt.TPM.Gen Avira Win32.HLLW.Nope
TR/Crypt.TPM.Gen Avira Program.Ardamax
TR/Crypt.TPM.Gen Avira Program.Ardamax.162
TR/Crypt.TPM.Gen Avira Trojan.Domort
TR/Crypt.TPM.Gen Avira Win32.HLLM.Beagle.45107
TR/Crypt.TPM.Gen Avira BackDoor.Poison
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.1798
TR/Crypt.TPM.Gen Avira Trojan.Proxy.2014
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.1991
TR/Crypt.TPM.Gen Avira Trojan.MulDrop.8008
TR/Crypt.TPM.Gen Avira BackDoor.Ogro
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2491
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.3540
TR/Crypt.TPM.Gen Avira Trojan.MulDrop.5850
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.3799
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.3796
TR/Crypt.TPM.Gen Avira Win32.HLLW.Autoruner.2514
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.2294
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.1620
TR/Crypt.TPM.Gen Avira Win32.HLLW.ForBot
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.1619
TR/Crypt.TPM.Gen Avira BackDoor.IRC.Sdbot.1714

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.