Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Tibs.J aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.451
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.583
Trojan:Win32/Tibs.J Microsoft Trojan.Fakealert.950
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.140
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.513
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.512
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.598
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.510
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.556
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.563
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.499
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.566
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.509
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.603
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.595
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.592
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.582
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.507
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.584
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.497
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.570
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoader.15909
Trojan:Win32/Tibs.J Microsoft Trojan.Spambot.3452
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoader.38511
Trojan:Win32/Tibs.J Microsoft Trojan.NtRootKit.1336
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoader.19256
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoader.63557
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoad.1040
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.440
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.452
Trojan:Win32/Tibs.J Microsoft Trojan.MulDrop.17277
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.448
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.462
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.449
Trojan:Win32/Tibs.J Microsoft Trojan.Clb.12
Trojan:Win32/Tibs.J Microsoft Trojan.Fakealert.995
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoad.3415
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoad.3181
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoader.59542
Trojan:Win32/Tibs.J Microsoft Trojan.MulDrop.18211
Trojan:Win32/Tibs.J Microsoft Trojan.MulDrop.17842
Trojan:Win32/Tibs.J Microsoft Trojan.Packed.601
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoader.63552
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoader.61663
Trojan:Win32/Tibs.J Microsoft Trojan.Spambot.3540
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoad.979
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoad.3162
Trojan:Win32/Tibs.J Microsoft Trojan.Spambot.3456
Trojan:Win32/Tibs.J Microsoft Trojan.DownLoad.945
Trojan:Win32/Tibs.J Microsoft Trojan.MulDrop.18201

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.