Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Malware.VB.51 aliases:

Name Vendor Dr.Web classification name
Malware.VB.51 VirusBlokAda Tool.TcpScan.13
Malware.VB.51 VirusBlokAda BackDoor.IRC.Tongbot
Malware.VB.51 VirusBlokAda Trojan.MulDrop.4594
Malware.VB.51 VirusBlokAda Trojan.MulDrop.8241
Malware.VB.51 VirusBlokAda Trojan.PWS.Legmir.592
Malware.VB.51 VirusBlokAda BackDoor.IRC.Sdbot.1881
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.11870
Malware.VB.51 VirusBlokAda Win32.HLLW.Gavir.8
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.9836
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.9251
Malware.VB.51 VirusBlokAda Trojan.DownLoader.58125
Malware.VB.51 VirusBlokAda Trojan.PWS.Wool
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.13413
Malware.VB.51 VirusBlokAda BackDoor.Bifrost
Malware.VB.51 VirusBlokAda Tool.IPCcrack
Malware.VB.51 VirusBlokAda Trojan.PWS.MagicPs.15
Malware.VB.51 VirusBlokAda Trojan.PWS.Gamania.3758
Malware.VB.51 VirusBlokAda Trojan.MulDrop.8941
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.9270
Malware.VB.51 VirusBlokAda Trojan.PWS.Bonque
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.669
Malware.VB.51 VirusBlokAda Trojan.DownLoader.31447
Malware.VB.51 VirusBlokAda Trojan.DownLoader.16531
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.2671
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.3542
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.6001
Malware.VB.51 VirusBlokAda Trojan.MulDrop.4064
Malware.VB.51 VirusBlokAda Trojan.PWS.Gamania.3777
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.5371
Malware.VB.51 VirusBlokAda Trojan.PWS.Vipgsm
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.5252
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.611
Malware.VB.51 VirusBlokAda Trojan.MulDrop.9434
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.4639
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.664
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.446
Malware.VB.51 VirusBlokAda Trojan.PWS.Legmir.141
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.9657
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.83
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.9384
Malware.VB.51 VirusBlokAda Trojan.PWS.Qqrobber.109
Malware.VB.51 VirusBlokAda Trojan.Inject.89
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.789
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.7080
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.209
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.5234
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.1559
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.9227
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.6146
Malware.VB.51 VirusBlokAda BackDoor.Pigeon.10342

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.