Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Delf.Inject.Z aliases:

Name Vendor Dr.Web classification name
Trojan.Delf.Inject.Z BitDefender BackDoor.IRC.Flood.8
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.24407
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.19150
Trojan.Delf.Inject.Z BitDefender BackDoor.Huai.5775
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.2050
Trojan.Delf.Inject.Z BitDefender BackDoor.HackDef.413
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.2330
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.3125
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.3126
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.443
Trojan.Delf.Inject.Z BitDefender Trojan.DownLoader.970
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.916
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.2133
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.10976
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.17176
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.16568
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.9682
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.3975
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.8072
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.9671
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.12932
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.8384
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.5244
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.6620
Trojan.Delf.Inject.Z BitDefender Trojan.Inject.3239
Trojan.Delf.Inject.Z BitDefender BackDoor.HackDef.412
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.7130
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.8841
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.11719
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.9189
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.9660
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.11075
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.16365
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.2127
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.2112
Trojan.Delf.Inject.Z BitDefender BackDoor.Mjc
Trojan.Delf.Inject.Z BitDefender Trojan.AVKill.299
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.15400
Trojan.Delf.Inject.Z BitDefender Trojan.DownLoader.62297
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.4433
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.1021
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.2288
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.11870
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.2254
Trojan.Delf.Inject.Z BitDefender Trojan.DownLoader.52443
Trojan.Delf.Inject.Z BitDefender Trojan.MulDrop.4573
Trojan.Delf.Inject.Z BitDefender Trojan.PWS.Lineage.3990
Trojan.Delf.Inject.Z BitDefender Trojan.Freed
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.4829
Trojan.Delf.Inject.Z BitDefender BackDoor.Pigeon.11069

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.