Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VirTool:Win32/DelfInject.gen!AC aliases:

Name Vendor Dr.Web classification name
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.LDPinch.4566
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Qqrobber.432
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Bifrost.917
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.NtRootKit.115
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Qqrobber.461
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.IRC.Suicide.25
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.4910
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.IRC.Simplbot
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.12938
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Pigeon.22165
VirTool:Win32/DelfInject.gen!AC Microsoft Win32.HLLW.Autoruner.5445
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Panda.4
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.20842
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.16599
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Poison.61
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.IRC.Sdbot.4748
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.DownLoader.46203
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Kidsfun
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Multi.34
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.11205
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.DownLoad.42219
VirTool:Win32/DelfInject.gen!AC Microsoft Tool.HideApp
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Multi.74
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.13744
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.DownLoader.59591
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Multi.81
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Multi.86
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.34143
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.AVKill.355
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.689
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.DownLoader.63483
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.KeyLogger.2331
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Bifrost.8
VirTool:Win32/DelfInject.gen!AC Microsoft Win32.HLLW.Autoruner.3712
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.23622
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Panda.114
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.4293
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.15022
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Gamania.16251
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Siggen.246
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Multi.69
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Qqrobber.419
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.4315
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.32131
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Siggen.306
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.13812
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Webmoner.60950
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.31851
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.13622
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.12159

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.