Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Crypt.Morphine.Gen aliases:

Name Vendor Dr.Web classification name
TR/Crypt.Morphine.Gen Avira Trojan.Packed.198
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.37561
TR/Crypt.Morphine.Gen Avira Adware.Zango
TR/Crypt.Morphine.Gen Avira BackDoor.Flux.101
TR/Crypt.Morphine.Gen Avira BackDoor.HackDef.359
TR/Crypt.Morphine.Gen Avira Trojan.Inject.345
TR/Crypt.Morphine.Gen Avira Trojan.Hooker.180
TR/Crypt.Morphine.Gen Avira Trojan.Hooker.21077
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.55004
TR/Crypt.Morphine.Gen Avira Trojan.Click.3614
TR/Crypt.Morphine.Gen Avira Adware.Hotbot
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.8214
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.8468
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.8465
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.8456
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.8451
TR/Crypt.Morphine.Gen Avira BackDoor.Salidol
TR/Crypt.Morphine.Gen Avira BackDoor.Servu.71
TR/Crypt.Morphine.Gen Avira Trojan.Stealth.50
TR/Crypt.Morphine.Gen Avira Trojan.PWS.Vipgsm
TR/Crypt.Morphine.Gen Avira Trojan.Troll
TR/Crypt.Morphine.Gen Avira Trojan.PWS.Barrior
TR/Crypt.Morphine.Gen Avira Trojan.PWS.Tanspy.1238
TR/Crypt.Morphine.Gen Avira BackDoor.Roam
TR/Crypt.Morphine.Gen Avira BackDoor.Pigeon.5305
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.14449
TR/Crypt.Morphine.Gen Avira BackDoor.Srvlite
TR/Crypt.Morphine.Gen Avira Trojan.Spambot.2488
TR/Crypt.Morphine.Gen Avira Win32.HLLM.Beagle
TR/Crypt.Morphine.Gen Avira BackDoor.Pasta
TR/Crypt.Morphine.Gen Avira BackDoor.Pigeon.82
TR/Crypt.Morphine.Gen Avira Trojan.PWS.Qqrobber.133
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.8872
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.433
TR/Crypt.Morphine.Gen Avira Program.ServUServer.60
TR/Crypt.Morphine.Gen Avira Trojan.Spambot
TR/Crypt.Morphine.Gen Avira Win32.HLLW.MyBot.79
TR/Crypt.Morphine.Gen Avira Win32.HLLM.Reset
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.49518
TR/Crypt.Morphine.Gen Avira BackDoor.HackDef.170
TR/Crypt.Morphine.Gen Avira DDoS.PopSer
TR/Crypt.Morphine.Gen Avira Trojan.PWS.LDPinch.3015
TR/Crypt.Morphine.Gen Avira BackDoor.Swz
TR/Crypt.Morphine.Gen Avira Trojan.Click.18615
TR/Crypt.Morphine.Gen Avira Trojan.PWS.Gamania.9042
TR/Crypt.Morphine.Gen Avira Trojan.Proxy.2161
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.10540
TR/Crypt.Morphine.Gen Avira Trojan.PWS.LDPinch.241
TR/Crypt.Morphine.Gen Avira Trojan.KeyLogger.90
TR/Crypt.Morphine.Gen Avira Trojan.Click.19059

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies