Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VirTool:Win32/DelfInject.gen!AG aliases:

Name Vendor Dr.Web classification name
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.IRC.Suicide.22
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.IRC.Suicide.23
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.17136
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.11278
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.12417
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.12403
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.IRC.Suicide.24
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.DownLoader.50961
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.16366
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.15589
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.13616
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.DownLoader.61848
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.PWS.LDPinch.4132
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Dosia.108
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.11806
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.13332
VirTool:Win32/DelfInject.gen!AG Microsoft Win32.HLLW.MyBot.14
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.Inject.523
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.DownLoader.48893
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.IRC.Suicide.36
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Dosia.72
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Poison.61
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.16385
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Bifrost.491
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Poison.807
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.18940
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.16378
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.DownLoad1.39571
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.Spambot.4719
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Poison.50
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Dosia.112
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.DownLoader.58293
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.16381
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.Click.17949
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.4545
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.KillFiles.813
VirTool:Win32/DelfInject.gen!AG Microsoft Win32.HLLW.Autoruner.1540
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.DownLoader.62364
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.PWS.LDPinch.7285
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.PWS.LDPinch.7342
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.PWS.Siggen.1357
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.PWS.Siggen.1487
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.54596
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Dosia.228
VirTool:Win32/DelfInject.gen!AG Microsoft Win32.HLLW.MyBot.2462
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.MulDrop.37544
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Dosia.243
VirTool:Win32/DelfInject.gen!AG Microsoft Trojan.Inject.5089
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Dosia.220
VirTool:Win32/DelfInject.gen!AG Microsoft BackDoor.Dosia.606

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.