Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Dropper.Delf.Crypt.I aliases:

Name Vendor Dr.Web classification name
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.PWS.Gamania.7843
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Bifrost
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.6666
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.4545
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.Packed.194
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Bifrost.917
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.KeyLogger.2331
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Dosia
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Bifrost.105
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.34233
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Poison.61
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Poison.685
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop1.4450
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop1.4722
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.50456
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.55563
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.50836
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.36126
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Cia.370
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.51576
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.54265
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.48282
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.52128
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.52143
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.37620
Trojan.Dropper.Delf.Crypt.I BitDefender BackDoor.Cia.444
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.49810
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.50297
Trojan.Dropper.Delf.Crypt.I BitDefender Trojan.MulDrop.52272

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.