Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Delf aliases:

Name Vendor Dr.Web classification name
Win32/Delf AVG Win32.HLLW.Wace
Win32/Delf AVG Trojan.MulDrop.7026
Win32/Delf Microsoft Trojan.MulDrop.1859
Win32/Delf Microsoft Trojan.MulDrop.5021
Win32/Delf Microsoft Trojan.MulDrop.12378
Win32/Delf Microsoft Trojan.DownLoader.7828
Win32/Delf Microsoft Trojan.MulDrop.2159
Win32/Delf Microsoft Trojan.Popupads
Win32/Delf Microsoft Trojan.Proxy.656
Win32/Delf Microsoft Trojan.DownLoader.56575
Win32/Delf Microsoft Trojan.DownLoader.46506
Win32/Delf Microsoft Trojan.DownLoader.16243
Win32/Delf Microsoft Trojan.AVKill.97
Win32/Delf Microsoft BackDoor.Butter
Win32/Delf Microsoft BackDoor.Dfgbot
Win32/Delf Microsoft Trojan.MulDrop.2097
Win32/Delf Microsoft Trojan.NtRootKit.25
Win32/Delf Microsoft Trojan.MulDrop.2202
Win32/Delf Microsoft Trojan.PWS.Banker.9790
Win32/Delf Microsoft Trojan.Ptop
Win32/Delf Microsoft Trojan.DownLoader.18606
Win32/Delf Microsoft Trojan.Proxy.1835
Win32/Delf Microsoft Trojan.PWS.Banker.9576
Win32/Delf Microsoft Trojan.PWS.MSNPass
Win32/Delf Microsoft Win32.HLLW.Botet
Win32/Delf Microsoft Win32.HLLW.Xmnet
Win32/Delf Microsoft Win32.RAHack
Win32/Delf Microsoft BackDoor.Oculto
Win32/Delf Microsoft BackDoor.Insti.41
Win32/Delf Microsoft BackDoor.Prosti
Win32/Delf Microsoft Trojan.DownLoader.1223
Win32/Delf Microsoft BackDoor.Rixx
Win32/Delf Microsoft BackDoor.Insti.42
Win32/Delf Microsoft Trojan.DownLoader.1785
Win32/Delf Microsoft Trojan.DownLoader.19576
Win32/Delf Microsoft Trojan.DownLoader.49849
Win32/Delf Microsoft Trojan.DownLoader.5296
Win32/Delf Microsoft BackDoor.IRC.Sdbot.1217
Win32/Delf Microsoft BackDoor.IRC.Sdbot.2813
Win32/Delf Microsoft Trojan.MulDrop.1004
Win32/Delf Microsoft Trojan.Kone
Win32/Delf Microsoft Trojan.Gurdof
Win32/Delf Microsoft Trojan.Inject.70
Win32/Delf Microsoft Trojan.Mosc
Win32/Delf Microsoft Trojan.KeyLogger.459
Win32/Delf Microsoft Trojan.Jet
Win32/Delf Microsoft Trojan.Kiil
Win32/Delf Microsoft Trojan.KeyLogger.431
Win32/Delf Microsoft Trojan.KeyLogger.439
Win32/Delf Microsoft BackDoor.Fob

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.