Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Crypt.Morphine.Gen aliases:

Name Vendor Dr.Web classification name
TR/Crypt.Morphine.Gen Avira Win32.HLLM.Dasha
TR/Crypt.Morphine.Gen Avira BackDoor.Rbot.10
TR/Crypt.Morphine.Gen Avira BackDoor.Hackamy
TR/Crypt.Morphine.Gen Avira Trojan.Isbar.241
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.688
TR/Crypt.Morphine.Gen Avira Trojan.Ginastub
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.1667
TR/Crypt.Morphine.Gen Avira Trojan.Proxy.151
TR/Crypt.Morphine.Gen Avira Trojan.LowZones.78
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.2751
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.9434
TR/Crypt.Morphine.Gen Avira BackDoor.Litmus.203
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.2083
TR/Crypt.Morphine.Gen Avira BackDoor.Rat.22
TR/Crypt.Morphine.Gen Avira BackDoor.IRC.Proxey
TR/Crypt.Morphine.Gen Avira Trojan.Packed.142
TR/Crypt.Morphine.Gen Avira Exploit.DCom.38
TR/Crypt.Morphine.Gen Avira Win32.HLLW.Billay
TR/Crypt.Morphine.Gen Avira Trojan.Proxy.319
TR/Crypt.Morphine.Gen Avira Trojan.PWS.SamSpy
TR/Crypt.Morphine.Gen Avira Trojan.Noshare
TR/Crypt.Morphine.Gen Avira BackDoor.Bifrost
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.2040
TR/Crypt.Morphine.Gen Avira Win32.HLLW.Maddis
TR/Crypt.Morphine.Gen Avira BackDoor.IRC.Jbbot.21
TR/Crypt.Morphine.Gen Avira Win32.Trilisa.1
TR/Crypt.Morphine.Gen Avira Trojan.Wintrim
TR/Crypt.Morphine.Gen Avira BackDoor.Servu.62
TR/Crypt.Morphine.Gen Avira Trojan.Starter
TR/Crypt.Morphine.Gen Avira Trojan.KeyLogger.226
TR/Crypt.Morphine.Gen Avira Trojan.Proxy.381
TR/Crypt.Morphine.Gen Avira Trojan.Sfind.185
TR/Crypt.Morphine.Gen Avira Win32.HLLM.Netsky.based
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.4401
TR/Crypt.Morphine.Gen Avira Program.ServUServer
TR/Crypt.Morphine.Gen Avira Win32.HLLW.Bashbot
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.2327
TR/Crypt.Morphine.Gen Avira Exploit.Lsass
TR/Crypt.Morphine.Gen Avira Trojan.Proxy.158
TR/Crypt.Morphine.Gen Avira Program.ioFTPD
TR/Crypt.Morphine.Gen Avira BackDoor.IRC.Sdbot.1900
TR/Crypt.Morphine.Gen Avira BackDoor.Servu.5201
TR/Crypt.Morphine.Gen Avira Win32.HLLW.MyBot.225
TR/Crypt.Morphine.Gen Avira Trojan.PurityAd
TR/Crypt.Morphine.Gen Avira BackDoor.Drony.30
TR/Crypt.Morphine.Gen Avira Trojan.Proxy.386
TR/Crypt.Morphine.Gen Avira Trojan.DownLoader.899
TR/Crypt.Morphine.Gen Avira Trojan.MulDrop.2293
TR/Crypt.Morphine.Gen Avira Tool.RemoteLaunch
TR/Crypt.Morphine.Gen Avira BackDoor.Y3krat.18

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.