Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Delf.Inject.F aliases:

Name Vendor Dr.Web classification name
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.13408
Trojan.Delf.Inject.F BitDefender Trojan.Inject.375
Trojan.Delf.Inject.F BitDefender Trojan.Inject.2984
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.12715
Trojan.Delf.Inject.F BitDefender Trojan.PWS.LDPinch.3228
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.15016
Trojan.Delf.Inject.F BitDefender BackDoor.BotNet
Trojan.Delf.Inject.F BitDefender Trojan.Inject.951
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.10877
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.17285
Trojan.Delf.Inject.F BitDefender Trojan.Packed.494
Trojan.Delf.Inject.F BitDefender Win32.HLLW.Autoruner.2132
Trojan.Delf.Inject.F BitDefender BackDoor.IRC.Rxbot.21
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.16727
Trojan.Delf.Inject.F BitDefender BackDoor.IRC.Rxbot
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.10876
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.10875
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.15588
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.13812
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.10207
Trojan.Delf.Inject.F BitDefender BackDoor.IRC.Sdbot
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.11916
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.18280
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.11821
Trojan.Delf.Inject.F BitDefender BackDoor.Graybird.2041
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.12389
Trojan.Delf.Inject.F BitDefender BackDoor.IRC.Simplbot
Trojan.Delf.Inject.F BitDefender BackDoor.IRC.Rxbot.15
Trojan.Delf.Inject.F BitDefender Trojan.DownLoad.26980
Trojan.Delf.Inject.F BitDefender Trojan.DownLoad.9365
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.16913
Trojan.Delf.Inject.F BitDefender BackDoor.BotNet.8
Trojan.Delf.Inject.F BitDefender BackDoor.Bifrost.1222
Trojan.Delf.Inject.F BitDefender Win32.HLLW.MyBot
Trojan.Delf.Inject.F BitDefender Win32.HLLM.MyDoom.134
Trojan.Delf.Inject.F BitDefender BackDoor.BotNet.7
Trojan.Delf.Inject.F BitDefender BackDoor.BotNet.34
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.28689
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.15891
Trojan.Delf.Inject.F BitDefender Trojan.Inject.3347
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop1.4753
Trojan.Delf.Inject.F BitDefender Trojan.Hooker.21059
Trojan.Delf.Inject.F BitDefender Program.XPCSpy
Trojan.Delf.Inject.F BitDefender Trojan.DownLoad1.37995
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.34463
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.27760
Trojan.Delf.Inject.F BitDefender Win32.HLLW.MyBot.4580
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop1.4360
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop1.4620
Trojan.Delf.Inject.F BitDefender Trojan.MulDrop.36535

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.