Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanClicker:Win32/Delf aliases:

Name Vendor Dr.Web classification name
TrojanClicker:Win32/Delf Microsoft Trojan.Kiil
TrojanClicker:Win32/Delf Microsoft Trojan.Click.1010
TrojanClicker:Win32/Delf Microsoft Trojan.Click.997
TrojanClicker:Win32/Delf Microsoft Trojan.Click.998
TrojanClicker:Win32/Delf Microsoft Trojan.Click.982
TrojanClicker:Win32/Delf Microsoft Trojan.Click.1012
TrojanClicker:Win32/Delf Microsoft Trojan.Click.992
TrojanClicker:Win32/Delf Microsoft Trojan.KeyLogger.439
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2330
TrojanClicker:Win32/Delf Microsoft Trojan.Click.18710
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2277
TrojanClicker:Win32/Delf Microsoft Trojan.Click.1967
TrojanClicker:Win32/Delf Microsoft Trojan.Click.788
TrojanClicker:Win32/Delf Microsoft Trojan.Click.3217
TrojanClicker:Win32/Delf Microsoft Trojan.Click.3205
TrojanClicker:Win32/Delf Microsoft DDoS.Iojik
TrojanClicker:Win32/Delf Microsoft Trojan.Seeker.190
TrojanClicker:Win32/Delf Microsoft Trojan.Seeker.191
TrojanClicker:Win32/Delf Microsoft Trojan.StartPage.20158
TrojanClicker:Win32/Delf Microsoft Trojan.DownLoader.409
TrojanClicker:Win32/Delf Microsoft Trojan.Seeker.188
TrojanClicker:Win32/Delf Microsoft Trojan.DownLoader.20473
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2089
TrojanClicker:Win32/Delf Microsoft Trojan.DownLoader.20347
TrojanClicker:Win32/Delf Microsoft Trojan.MulDrop.6273
TrojanClicker:Win32/Delf Microsoft Trojan.Click.1912
TrojanClicker:Win32/Delf Microsoft Trojan.Ptop
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2334
TrojanClicker:Win32/Delf Microsoft Trojan.StartPage.1771
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2288
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2555
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2800
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2525
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2526
TrojanClicker:Win32/Delf Microsoft Trojan.Click.2297
TrojanClicker:Win32/Delf Microsoft Trojan.StartPage.20036
TrojanClicker:Win32/Delf Microsoft Trojan.DownLoader.35810
TrojanClicker:Win32/Delf Microsoft Trojan.Click.3959
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4266
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4299
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4306
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4287
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4295
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4308
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4264
TrojanClicker:Win32/Delf Microsoft Trojan.Click.3966
TrojanClicker:Win32/Delf Microsoft Trojan.Click.3597
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4296
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4241
TrojanClicker:Win32/Delf Microsoft Trojan.Click.4278

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.