Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan-Dropper.VB.5 aliases:

Name Vendor Dr.Web classification name
Trojan-Dropper.VB.5 VirusBlokAda Win32.IRC.Bot.based
Trojan-Dropper.VB.5 VirusBlokAda Trojan.MulDrop.299
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1083
Trojan-Dropper.VB.5 VirusBlokAda Win32.HLLW.MyBot.221
Trojan-Dropper.VB.5 VirusBlokAda Trojan.Troll
Trojan-Dropper.VB.5 VirusBlokAda Trojan.Takill
Trojan-Dropper.VB.5 VirusBlokAda Trojan.DownLoader.4046
Trojan-Dropper.VB.5 VirusBlokAda Trojan.DownLoader.28951
Trojan-Dropper.VB.5 VirusBlokAda Trojan.DownLoader.31715
Trojan-Dropper.VB.5 VirusBlokAda Win32.HLLW.Agobot
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.Bla.54
Trojan-Dropper.VB.5 VirusBlokAda Trojan.MulDrop.2220
Trojan-Dropper.VB.5 VirusBlokAda Win32.HLLW.MyBot
Trojan-Dropper.VB.5 VirusBlokAda Trojan.DownLoader.1281
Trojan-Dropper.VB.5 VirusBlokAda Trojan.DownLoader.4400
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.912
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.139
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.142
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.131
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.ProRat.252
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.DMoon.57
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1085
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1100
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1075
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1084
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1081
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.ProRat.16
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.121
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.ProRat.197
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Hozzer
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1706
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.ProRat.14
Trojan-Dropper.VB.5 VirusBlokAda Win32.HLLW.MyBot.225
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.Netshadow
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Wisdom
Trojan-Dropper.VB.5 VirusBlokAda Win32.HLLW.MyBot.based
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.Ame
Trojan-Dropper.VB.5 VirusBlokAda Trojan.PWS.LDPinch.1671
Trojan-Dropper.VB.5 VirusBlokAda Trojan.PWS.Legmir.415
Trojan-Dropper.VB.5 VirusBlokAda Win32.HLLM.MyDoom.96
Trojan-Dropper.VB.5 VirusBlokAda Trojan.KeyLogger.2331
Trojan-Dropper.VB.5 VirusBlokAda Trojan.MulDrop.3636
Trojan-Dropper.VB.5 VirusBlokAda Trojan.MulDrop.387
Trojan-Dropper.VB.5 VirusBlokAda Trojan.PWS.Banker.19169
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.314
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.385
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.IRC.Sdbot.1836
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.DMoon
Trojan-Dropper.VB.5 VirusBlokAda BackDoor.DarkMoon.112

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.