Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDropper:Win32/VB.EM aliases:

Name Vendor Dr.Web classification name
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Pufa
TrojanDropper:Win32/VB.EM Microsoft Trojan.MulDrop.8347
TrojanDropper:Win32/VB.EM Microsoft Win32.HLLW.MyBot.13
TrojanDropper:Win32/VB.EM Microsoft Trojan.MulDrop.32131
TrojanDropper:Win32/VB.EM Microsoft Trojan.Siggen.2245
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1021
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Bifrost.8
TrojanDropper:Win32/VB.EM Microsoft Trojan.Rent.166
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison
TrojanDropper:Win32/VB.EM Microsoft BackDoor.IRC.Sdbot.3762
TrojanDropper:Win32/VB.EM Microsoft Trojan.Suicide.11
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.686
TrojanDropper:Win32/VB.EM Microsoft BackDoor.IRC.Sdbot.4707
TrojanDropper:Win32/VB.EM Microsoft Trojan.PWS.Multi.38
TrojanDropper:Win32/VB.EM Microsoft Trojan.Proxy.5961
TrojanDropper:Win32/VB.EM Microsoft BackDoor.IRC.Sdbot.4667
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Bifrost
TrojanDropper:Win32/VB.EM Microsoft BackDoor.IRC.Sdbot.4988
TrojanDropper:Win32/VB.EM Microsoft Trojan.DownLoader.6359
TrojanDropper:Win32/VB.EM Microsoft Trojan.PWS.LDPinch.4308
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1818
TrojanDropper:Win32/VB.EM Microsoft BackDoor.IRC.Sdbot.6304
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1676
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1997
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1242
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1277
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1710
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1791
TrojanDropper:Win32/VB.EM Microsoft BackDoor.IRC.Sdbot.6902
TrojanDropper:Win32/VB.EM Microsoft BackDoor.Poison.1304
TrojanDropper:Win32/VB.EM Microsoft BackDoor.IRC.Sdbot.5887

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.