Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/VB aliases:

Name Vendor Dr.Web classification name
Win32/VB Microsoft BackDoor.Generic.1033
Win32/VB Microsoft Trojan.DownLoader.3716
Win32/VB Microsoft BackDoor.BioNuke
Win32/VB Microsoft BackDoor.Generic.1042
Win32/VB Microsoft BackDoor.Mssvr
Win32/VB Microsoft BackDoor.Eetheer
Win32/VB Microsoft BackDoor.Watchtower.12
Win32/VB Microsoft BackDoor.Evade.13
Win32/VB Microsoft BackDoor.Contador
Win32/VB Microsoft BackDoor.Lamerat.210
Win32/VB Microsoft Trojan.DownLoader.3480
Win32/VB Microsoft BackDoor.IRC.Botflo
Win32/VB Microsoft BackDoor.Generic.1032
Win32/VB Microsoft BackDoor.Watchtower.13
Win32/VB Microsoft BackDoor.Upnp
Win32/VB Microsoft BackDoor.Watchtower.14
Win32/VB Microsoft BackDoor.Watchtower.10
Win32/VB Microsoft Win32.HLLW.Chameleon
Win32/VB Microsoft Trojan.DownLoader.12582
Win32/VB Microsoft Trojan.Mdt
Win32/VB Microsoft Trojan.DownLoader.17325
Win32/VB Microsoft Win32.HLLW.Glorious
Win32/VB Microsoft Win32.HLLW.Generic.69
Win32/VB Microsoft Trojan.Click.1723
Win32/VB Microsoft Dialer.Bus
Win32/VB Microsoft Trojan.Click.1734
Win32/VB Microsoft Trojan.Click.1695
Win32/VB Microsoft Trojan.Click.1718
Win32/VB Microsoft Trojan.Click.1671
Win32/VB Microsoft Tool.MassMail
Win32/VB Microsoft Trojan.Click.1663
Win32/VB Microsoft Trojan.Ulone
Win32/VB Microsoft BackDoor.Generic.1352
Win32/VB Microsoft BackDoor.Furtif
Win32/VB Microsoft BackDoor.Generic.1353
Win32/VB Microsoft BackDoor.Generic.1349
Win32/VB Microsoft Trojan.AVKill.219
Win32/VB Microsoft Win32.HLLW.Autoruner.229
Win32/VB Microsoft Trojan.DownLoader.3406
Win32/VB Microsoft Trojan.DownLoader.4483
Win32/VB Microsoft Trojan.DownLoader.10697
Win32/VB Microsoft Trojan.DownLoader.35138
Win32/VB Microsoft Trojan.DownLoader.10791
Win32/VB Microsoft Trojan.DownLoader.29533
Win32/VB Microsoft BackDoor.Admeser
Win32/VB Microsoft BackDoor.Kakaka
Win32/VB Microsoft Trojan.DownLoader.4552
Win32/VB Microsoft Trojan.Click.17403
Win32/VB Microsoft Trojan.PWS.Bancos.189
Win32/VB Microsoft Trojan.KeyLogger.276

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.