Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic!Morphine aliases:

Name Vendor Dr.Web classification name
Generic!Morphine McAfee BackDoor.IRC.Sdbot.based
Generic!Morphine McAfee Win32.HLLW.Randex.45056
Generic!Morphine McAfee Trojan.PWS.Lineage
Generic!Morphine McAfee Trojan.Proxy.129
Generic!Morphine McAfee Trojan.Proxy.122
Generic!Morphine McAfee Trojan.MulDrop.978
Generic!Morphine McAfee Exploit.DCom.34
Generic!Morphine McAfee BackDoor.SubSeven.215
Generic!Morphine McAfee Trojan.MulDrop.553
Generic!Morphine McAfee Trojan.DownLoader.797
Generic!Morphine McAfee Trojan.DownLoader.694
Generic!Morphine McAfee Trojan.LowZones
Generic!Morphine McAfee Trojan.Flood.22016
Generic!Morphine McAfee Trojan.Proxy.148
Generic!Morphine McAfee BackDoor.Servu.5000
Generic!Morphine McAfee BackDoor.IRC.based
Generic!Morphine McAfee Trojan.DownLoader.1202
Generic!Morphine McAfee Trojan.MulDrop.433
Generic!Morphine McAfee FDOS.Syn.13
Generic!Morphine McAfee BackDoor.Snow.31
Generic!Morphine McAfee BackDoor.Redkod.14
Generic!Morphine McAfee BackDoor.Servu.41
Generic!Morphine McAfee BackDoor.RC
Generic!Morphine McAfee BackDoor.ProRat.16
Generic!Morphine McAfee BackDoor.OptixPro.132
Generic!Morphine McAfee Trojan.PWS.LDPinch.241
Generic!Morphine McAfee BackDoor.Mosu
Generic!Morphine McAfee BackDoor.DarkMoon.67
Generic!Morphine McAfee Win32.HLLM.MyDoom.based
Generic!Morphine McAfee Win32.HLLM.Dasha
Generic!Morphine McAfee Trojan.DownLoader.226
Generic!Morphine McAfee Trojan.MulDrop.1175
Generic!Morphine McAfee Win32.HLLW.MyBot
Generic!Morphine McAfee Win32.HLLW.SpyBot
Generic!Morphine McAfee BackDoor.IRC.Sdbot
Generic!Morphine McAfee Win32.HLLW.MyBot.based
Generic!Morphine McAfee Win32.HLLM.Netsky.based
Generic!Morphine McAfee Win32.HLLW.Agobot
Generic!Morphine McAfee Win32.IRC.Bot.based
Generic!Morphine McAfee Trojan.KeyLogger.63
Generic!Morphine McAfee Trojan.Ranky
Generic!Morphine McAfee Trojan.Proxy.154
Generic!Morphine McAfee Trojan.Proxy.319
Generic!Morphine McAfee Trojan.DownLoader.1872
Generic!Morphine McAfee Trojan.Aimlink
Generic!Morphine McAfee BackDoor.Dogmile
Generic!Morphine McAfee BackDoor.Servu.25
Generic!Morphine McAfee Trojan.Proxy.317
Generic!Morphine McAfee Trojan.Troll
Generic!Morphine McAfee BackDoor.Servu.4100

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.