Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VirTool:Win32/DelfInject.gen!J aliases:

Name Vendor Dr.Web classification name
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.30191
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.IRC.Sdbot.3654
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.IRC.Sdbot
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.7957
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.IRC.Sdbot.3860
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.DownLoad.27977
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.DownLoader.59589
VirTool:Win32/DelfInject.gen!J Microsoft Win32.HLLW.Autoruner.5652
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.Inject.510
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.Bifrost.1004
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.DownLoader.20468
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.4611
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.6294
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.Bifrost.835
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.6245
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.DownLoader.33431
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.Pigeon.7276
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.PWS.Qqrobber.243
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.9987
VirTool:Win32/DelfInject.gen!J Microsoft Adware.DollarRevenue.206
VirTool:Win32/DelfInject.gen!J Microsoft Win32.HLLW.Autoruner.1029
VirTool:Win32/DelfInject.gen!J Microsoft Win32.HLLW.Autoruner.1842
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.PWS.Banker.16048
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.IRC.Evil
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.Poison
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.3130
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.17711
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.14115
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.4132
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.30808
VirTool:Win32/DelfInject.gen!J Microsoft BackDoor.IRC.Sdbot.4592
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.10421
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.Inject.572
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.PWS.Siggen.2
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.13821
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.PWS.Banker.10545
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.PWS.Banker.18179
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.10664
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.6888
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.12958
VirTool:Win32/DelfInject.gen!J Microsoft Win32.HLLW.Autoruner.1570
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.Kidsfun
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.PWS.Banker.20027
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.DownLoader.56757
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.Inject.5485
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.28262
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.11983
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.4801
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.13744
VirTool:Win32/DelfInject.gen!J Microsoft Trojan.MulDrop.15026

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.