Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Generic.Delphi.c aliases:

Name Vendor Dr.Web classification name
W32/Generic.Delphi.c McAfee Trojan.KillFiles.79
W32/Generic.Delphi.c McAfee BackDoor.IRC.Subot
W32/Generic.Delphi.c McAfee BackDoor.IRC.Soda
W32/Generic.Delphi.c McAfee Win32.HLLP.Neshta
W32/Generic.Delphi.c McAfee Win32.HLLW.Botsil
W32/Generic.Delphi.c McAfee Trojan.DownLoader.4453
W32/Generic.Delphi.c McAfee Trojan.StartPage.1058
W32/Generic.Delphi.c McAfee Trojan.PWS.Lamar
W32/Generic.Delphi.c McAfee Win32.HLLM.Sunami
W32/Generic.Delphi.c McAfee Win32.HLLW.Girc
W32/Generic.Delphi.c McAfee Win32.HLLM.Shutface.30280
W32/Generic.Delphi.c McAfee Win32.HLLW.Cdbur
W32/Generic.Delphi.c McAfee Win32.HLLW.Bigga
W32/Generic.Delphi.c McAfee Win32.HLLM.Arman
W32/Generic.Delphi.c McAfee Win32.HLLW.Animal
W32/Generic.Delphi.c McAfee Win32.HLLW.Antimanele
W32/Generic.Delphi.c McAfee Trojan.PWS.Banker.970
W32/Generic.Delphi.c McAfee Win32.HLLM.Jappin
W32/Generic.Delphi.c McAfee BackDoor.IRC.Stub
W32/Generic.Delphi.c McAfee Win32.HLLW.Chain
W32/Generic.Delphi.c McAfee Win32.HLLW.Incef
W32/Generic.Delphi.c McAfee Win32.HLLP.Fsde
W32/Generic.Delphi.c McAfee Win32.HLLW.Eaza
W32/Generic.Delphi.c McAfee Win32.HLLM.Azag
W32/Generic.Delphi.c McAfee BackDoor.IRC.Frux
W32/Generic.Delphi.c McAfee BackDoor.IRC.Fooba
W32/Generic.Delphi.c McAfee Win32.HLLW.Ladan
W32/Generic.Delphi.c McAfee Win32.HLLW.Herb
W32/Generic.Delphi.c McAfee BackDoor.IRC.Chainer
W32/Generic.Delphi.c McAfee Win32.HLLW.Bigga.38
W32/Generic.Delphi.c McAfee BackDoor.IRC.Poke
W32/Generic.Delphi.c McAfee Win32.HLLW.Tsunami
W32/Generic.Delphi.c McAfee BackDoor.Stfu
W32/Generic.Delphi.c McAfee Win32.HLLW.Herb.9
W32/Generic.Delphi.c McAfee Trojan.MulDrop.8459
W32/Generic.Delphi.c McAfee Trojan.MulDrop.8460
W32/Generic.Delphi.c McAfee Win32.HLLW.Bigga.39
W32/Generic.Delphi.c McAfee BackDoor.IRC.Fooba.4
W32/Generic.Delphi.c McAfee BackDoor.Harvester.83
W32/Generic.Delphi.c McAfee Win32.HLLW.Herb.10
W32/Generic.Delphi.c McAfee BackDoor.HackDef.402
W32/Generic.Delphi.c McAfee BackDoor.IRC.Fooba.5
W32/Generic.Delphi.c McAfee Win32.HLLW.Autoruner.401
W32/Generic.Delphi.c McAfee Trojan.MulDrop.10639
W32/Generic.Delphi.c McAfee Win32.HLLP.Winsta
W32/Generic.Delphi.c McAfee Trojan.KeyLogger.721
W32/Generic.Delphi.c McAfee Win32.HLLM.Silent
W32/Generic.Delphi.c McAfee Trojan.KeyLogger.268
W32/Generic.Delphi.c McAfee Trojan.DownLoader.24002
W32/Generic.Delphi.c McAfee BackDoor.HackDef.149

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.