Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Dropper.Delf aliases:

Name Vendor Dr.Web classification name
Dropper.Delf AVG Trojan.MulDrop.4527
Dropper.Delf AVG Trojan.MulDrop.10218
Dropper.Delf AVG Trojan.MulDrop.14549
Dropper.Delf AVG Trojan.DownLoader.50961
Dropper.Delf AVG Trojan.MulDrop.1004
Dropper.Delf AVG Trojan.MulDrop.12276
Dropper.Delf AVG Trojan.MulDrop.16597
Dropper.Delf AVG Trojan.MulDrop.3130
Dropper.Delf AVG Trojan.MulDrop.8379
Dropper.Delf AVG Trojan.MulDrop.15588
Dropper.Delf AVG Trojan.Inject.902
Dropper.Delf AVG Win32.HLLW.Autoruner.1540
Dropper.Delf AVG Win32.HLLM.Netsky.18353
Dropper.Delf AVG Trojan.MulDrop.8500
Dropper.Delf AVG Trojan.MulDrop.15597
Dropper.Delf AVG Trojan.MulDrop.16888
Dropper.Delf AVG Trojan.MulDrop.11351
Dropper.Delf AVG Trojan.MulDrop.17090
Dropper.Delf AVG Trojan.MulDrop.15011
Dropper.Delf AVG Trojan.Rent
Dropper.Delf AVG Trojan.MulDrop.14964
Dropper.Delf AVG Trojan.MulDrop.14471
Dropper.Delf AVG Trojan.MulDrop.8004
Dropper.Delf AVG Trojan.MulDrop.16619
Dropper.Delf AVG Trojan.MulDrop.14952
Dropper.Delf AVG Trojan.MulDrop.17711
Dropper.Delf AVG Trojan.MulDrop.26175
Dropper.Delf AVG Trojan.DownLoader.62364
Dropper.Delf AVG Trojan.MulDrop.13678
Dropper.Delf AVG Trojan.MulDrop.15038
Dropper.Delf AVG Trojan.DownLoad.186
Dropper.Delf AVG BackDoor.IRC.Simplbot.2
Dropper.Delf AVG Trojan.Inject.748
Dropper.Delf AVG Trojan.Inject.5183
Dropper.Delf AVG Trojan.MulDrop.4111
Dropper.Delf AVG Trojan.MulDrop.17285
Dropper.Delf AVG Trojan.Packed.194
Dropper.Delf AVG Trojan.Packed.494
Dropper.Delf AVG Trojan.MulDrop.1405
Dropper.Delf AVG Trojan.DownLoader.1055
Dropper.Delf AVG Trojan.MulDrop.18453
Dropper.Delf AVG Trojan.MulDrop.18429
Dropper.Delf AVG Trojan.MulDrop.18408
Dropper.Delf AVG Trojan.MulDrop.17126
Dropper.Delf AVG Trojan.MulDrop.13277
Dropper.Delf AVG Trojan.WMSteal
Dropper.Delf AVG Trojan.MulDrop.12540
Dropper.Delf AVG Trojan.DownLoader.53963
Dropper.Delf AVG Trojan.MulDrop.11806
Dropper.Delf AVG Trojan.MulDrop.5059

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.