Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Crypt.MWPM.Gen aliases:

Name Vendor Dr.Web classification name
TR/Crypt.MWPM.Gen Avira Trojan.Packed.471
TR/Crypt.MWPM.Gen Avira BackDoor.Ducktoy.111
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.28183
TR/Crypt.MWPM.Gen Avira Trojan.MulDrop.5624
TR/Crypt.MWPM.Gen Avira Trojan.PWS.LDPinch.1489
TR/Crypt.MWPM.Gen Avira Trojan.Packed.158
TR/Crypt.MWPM.Gen Avira Trojan.PWS.LDPinch.1130
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Sdbot.945
TR/Crypt.MWPM.Gen Avira Trojan.PWS.LDPinch.1530
TR/Crypt.MWPM.Gen Avira Trojan.LowZones
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Evil
TR/Crypt.MWPM.Gen Avira Trojan.PWS.Banker.8984
TR/Crypt.MWPM.Gen Avira Trojan.MulDrop.5065
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.23457
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.24766
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.16525
TR/Crypt.MWPM.Gen Avira Trojan.DownLoad.26815
TR/Crypt.MWPM.Gen Avira Win32.HLLW.Autoruner.6328
TR/Crypt.MWPM.Gen Avira Win32.HLLW.Autoruner.6255
TR/Crypt.MWPM.Gen Avira Trojan.Click.4898
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.36887
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.37490
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Sdbot.3762
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Sdbot.2217
TR/Crypt.MWPM.Gen Avira BackDoor.Pigeon.20436
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Sdbot.4661
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Unkbot.19
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Sdbot.56
TR/Crypt.MWPM.Gen Avira BackDoor.Pigeon.17378
TR/Crypt.MWPM.Gen Avira Win32.Parite.2
TR/Crypt.MWPM.Gen Avira BackDoor.Bifrost.816
TR/Crypt.MWPM.Gen Avira BackDoor.Pigeon.12693
TR/Crypt.MWPM.Gen Avira Trojan.Aphex.5642
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.3555
TR/Crypt.MWPM.Gen Avira Win32.IRC.Bot.based
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Sdbot.471
TR/Crypt.MWPM.Gen Avira Win32.IRC.Bot
TR/Crypt.MWPM.Gen Avira Win32.HLLW.ForBot
TR/Crypt.MWPM.Gen Avira Trojan.Packed.140
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.1167
TR/Crypt.MWPM.Gen Avira Trojan.Isbar.183
TR/Crypt.MWPM.Gen Avira BackDoor.ColdFusion.11
TR/Crypt.MWPM.Gen Avira BackDoor.Ciadoor
TR/Crypt.MWPM.Gen Avira Trojan.Isbar.241
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.694
TR/Crypt.MWPM.Gen Avira BackDoor.IRC.Sdbot
TR/Crypt.MWPM.Gen Avira Trojan.LowZones.126
TR/Crypt.MWPM.Gen Avira Win32.HLLW.MyBot
TR/Crypt.MWPM.Gen Avira BackDoor.Poison.55
TR/Crypt.MWPM.Gen Avira Trojan.DownLoader.2884

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.