Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VirTool:Win32/DelfInject.gen!X aliases:

Name Vendor Dr.Web classification name
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.23357
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.7888
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.12024
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.17176
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.14115
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.3130
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.10660
VirTool:Win32/DelfInject.gen!X Microsoft Win32.HLLM.Netsky.18353
VirTool:Win32/DelfInject.gen!X Microsoft Win32.HLLW.Autoruner.1344
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.18466
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.9813
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.16877
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.9671
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.PWS.Siggen.2
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.13371
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.13662
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.Inject.3383
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.13333
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.13092
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.7062
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.16365
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.14471
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.15400
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.4545
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.62896
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.56828
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.62297
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.59153
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.59961
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.48887
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.56757
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.63572
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.65011
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.16351
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.AVKill.299
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Wua
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.12497
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.DownLoader.37301
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Fearless.19
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.PWS.Vipgsm
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.PWS.Qqpass.361
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.16599
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.10848
VirTool:Win32/DelfInject.gen!X Microsoft Trojan.MulDrop.7891
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.11748
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Inge
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Poison.21
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.11548
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.11540
VirTool:Win32/DelfInject.gen!X Microsoft BackDoor.Pigeon.9530

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.