Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VirTool:Win32/DelfInject.gen!AM aliases:

Name Vendor Dr.Web classification name
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.448
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.18267
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.16857
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.GoldSpy.2210
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.17489
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.17528
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.17450
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Spambot.3525
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.GoldSpy.2197
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.GoldSpy.2832
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.GoldSpy.2833
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.DownLoad.1051
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.16854
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.16855
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.162
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.DownLoad.4201
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.196
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.35926
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Inject.3769
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.366
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.452
VirTool:Win32/DelfInject.gen!AM Microsoft BackDoor.Nunaks
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.LDPinch.1417
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.15941
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.LDPinch.1407
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.16503
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.16461
VirTool:Win32/DelfInject.gen!AM Microsoft BackDoor.Dax.15
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.1418
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.3102
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.5938
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Fakealert.458
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.LDPinch.1941
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.17277
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.DownLoad1.37157
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Proxy.2783
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop1.4566
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop1.4796
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop1.4646
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.1208
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Proxy.3099
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.MulDrop.20134
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.GoldSpy.2170
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.LDPinch.4182
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.Panda.9
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.DownLoad.3735
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.PWS.LDPinch.4308
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Proxy.2003
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Packed.1197
VirTool:Win32/DelfInject.gen!AM Microsoft Trojan.Inject.5256

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.