Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.VB.Nikolas aliases:

Name Vendor Dr.Web classification name
Trojan.VB.Nikolas VirusBlokAda Trojan.DownLoad.30753
Trojan.VB.Nikolas VirusBlokAda BackDoor.DarkMoon.41
Trojan.VB.Nikolas VirusBlokAda Trojan.MulDrop.31969
Trojan.VB.Nikolas VirusBlokAda BackDoor.Bifrost
Trojan.VB.Nikolas VirusBlokAda BackDoor.Shark
Trojan.VB.Nikolas VirusBlokAda Trojan.PWS.Multi.81
Trojan.VB.Nikolas VirusBlokAda Trojan.MulDrop.31897
Trojan.VB.Nikolas VirusBlokAda Trojan.MulDrop.31898
Trojan.VB.Nikolas VirusBlokAda Trojan.PWS.Spy.92
Trojan.VB.Nikolas VirusBlokAda Trojan.DownLoader.46203
Trojan.VB.Nikolas VirusBlokAda BackDoor.Generic.1664
Trojan.VB.Nikolas VirusBlokAda Trojan.Inject.5728
Trojan.VB.Nikolas VirusBlokAda BackDoor.Generic.1700
Trojan.VB.Nikolas VirusBlokAda Trojan.Rent.14
Trojan.VB.Nikolas VirusBlokAda BackDoor.Iam
Trojan.VB.Nikolas VirusBlokAda Trojan.DownLoader.50818
Trojan.VB.Nikolas VirusBlokAda Trojan.Shark.808
Trojan.VB.Nikolas VirusBlokAda Win32.HLLW.MyBot.227
Trojan.VB.Nikolas VirusBlokAda Trojan.PWS.Stealer.129
Trojan.VB.Nikolas VirusBlokAda BackDoor.IRC.Sdbot.4698
Trojan.VB.Nikolas VirusBlokAda Trojan.Packed.650
Trojan.VB.Nikolas VirusBlokAda Trojan.Packed.120
Trojan.VB.Nikolas VirusBlokAda BackDoor.Bifrost.8
Trojan.VB.Nikolas VirusBlokAda Trojan.Packed.2027
Trojan.VB.Nikolas VirusBlokAda Win32.HLLW.MyBot.4128
Trojan.VB.Nikolas VirusBlokAda BackDoor.Dosia.108
Trojan.VB.Nikolas VirusBlokAda Trojan.Siggen.58720
Trojan.VB.Nikolas VirusBlokAda Trojan.Siggen.63695
Trojan.VB.Nikolas VirusBlokAda Win32.HLLW.MyBot.3440
Trojan.VB.Nikolas VirusBlokAda Trojan.PWS.Multi.38
Trojan.VB.Nikolas VirusBlokAda Win32.HLLW.MyBot.230
Trojan.VB.Nikolas VirusBlokAda Trojan.DownLoad1.38522
Trojan.VB.Nikolas VirusBlokAda Win32.HLLW.MyBot
Trojan.VB.Nikolas VirusBlokAda BackDoor.Poison.1021
Trojan.VB.Nikolas VirusBlokAda BackDoor.Poison.66
Trojan.VB.Nikolas VirusBlokAda Trojan.MulDrop.31919
Trojan.VB.Nikolas VirusBlokAda BackDoor.Shark.20
Trojan.VB.Nikolas VirusBlokAda Trojan.Siggen.60725
Trojan.VB.Nikolas VirusBlokAda Tool.PassView.117
Trojan.VB.Nikolas VirusBlokAda Trojan.Packed.2031
Trojan.VB.Nikolas VirusBlokAda Trojan.MulDrop.12724
Trojan.VB.Nikolas VirusBlokAda Trojan.Packed.2348
Trojan.VB.Nikolas VirusBlokAda Trojan.MulDrop.31713
Trojan.VB.Nikolas VirusBlokAda Trojan.Siggen.61191
Trojan.VB.Nikolas VirusBlokAda BackDoor.Bifrost.816
Trojan.VB.Nikolas VirusBlokAda Trojan.Packed.2463
Trojan.VB.Nikolas VirusBlokAda Trojan.Siggen.4729
Trojan.VB.Nikolas VirusBlokAda Trojan.Siggen.4709
Trojan.VB.Nikolas VirusBlokAda BackDoor.Xboot
Trojan.VB.Nikolas VirusBlokAda Trojan.MulDrop.30824

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.