Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Virus.Win32.Delf.an aliases:

Name Vendor Dr.Web classification name
Virus.Win32.Delf.an Kaspersky Trojan.NtRootKit.191
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.1569
Virus.Win32.Delf.an Kaspersky Trojan.PWS.Ghost
Virus.Win32.Delf.an Kaspersky BackDoor.Poison
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.5297
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.5333
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.5384
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.12678
Virus.Win32.Delf.an Kaspersky BackDoor.Beizhu.271
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.7472
Virus.Win32.Delf.an VirusBlokAda DDoS.Rincux
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.3983
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.2745
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.12933
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.2646
Virus.Win32.Delf.an Kaspersky Win32.HLLM.Ads
Virus.Win32.Delf.an Kaspersky BackDoor.Rejoice.145
Virus.Win32.Delf.an Kaspersky BackDoor.Huai.2675
Virus.Win32.Delf.an Kaspersky Trojan.DownLoader.20701
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.1728
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.5585
Virus.Win32.Delf.an Kaspersky Nuke.Miso
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.13257
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.6594
Virus.Win32.Delf.an Kaspersky BackDoor.Hamtaro
Virus.Win32.Delf.an VirusBlokAda BackDoor.Hamtaro
Virus.Win32.Delf.an Kaspersky Trojan.MulDrop.8862
Virus.Win32.Delf.an VirusBlokAda Trojan.MulDrop.8862
Virus.Win32.Delf.an VirusBlokAda Trojan.NtRootKit.191
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.11886
Virus.Win32.Delf.an Kaspersky BackDoor.Huai.2720
Virus.Win32.Delf.an VirusBlokAda BackDoor.Huai.2720
Virus.Win32.Delf.an Kaspersky BackDoor.King
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.12460
Virus.Win32.Delf.an VirusBlokAda BackDoor.Pigeon.12460
Virus.Win32.Delf.an VirusBlokAda Trojan.KeyLogger.2075
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.4946
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.5109
Virus.Win32.Delf.an Kaspersky Win32.HLLW.Wace
Virus.Win32.Delf.an Kaspersky BackDoor.IRC.Sdbot.2793
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.8747
Virus.Win32.Delf.an Kaspersky Win32.HLLP.Ads.46124
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.2850
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.7211
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.2876
Virus.Win32.Delf.an Kaspersky Trojan.PWS.Vipgsm
Virus.Win32.Delf.an Kaspersky Trojan.DownLoad.2789
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.1106
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.9246
Virus.Win32.Delf.an Kaspersky BackDoor.Pigeon.6236

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.