Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/VB aliases:

Name Vendor Dr.Web classification name
Win32/VB Microsoft Trojan.DownLoader.4229
Win32/VB Microsoft BackDoor.Generic.1396
Win32/VB Microsoft Trojan.MulDrop.4670
Win32/VB Microsoft Trojan.PWS.Store
Win32/VB Microsoft Trojan.PWS.Toxic
Win32/VB Microsoft Trojan.Kody
Win32/VB Microsoft Trojan.DownLoader.9099
Win32/VB Microsoft Trojan.MulDrop.15858
Win32/VB Microsoft Win32.Virut.9156
Win32/VB Microsoft BackDoor.Tahomad
Win32/VB Microsoft BackDoor.Slimhor
Win32/VB Microsoft Trojan.Luall
Win32/VB Microsoft Win32.HLLW.Generic.157
Win32/VB Microsoft Trojan.Crayon
Win32/VB Microsoft Win32.HLLW.Coza
Win32/VB Microsoft Trojan.PWS.Aimlog
Win32/VB Microsoft Trojan.DownLoader.4179
Win32/VB Microsoft Trojan.Starter.96
Win32/VB Microsoft Trojan.PWS.Webmonier
Win32/VB Microsoft Trojan.Topfox
Win32/VB Microsoft Trojan.Hesy
Win32/VB Microsoft Trojan.KeyLogger.36864
Win32/VB Microsoft BackDoor.IRC.Turbinos
Win32/VB Microsoft Trojan.Click
Win32/VB Microsoft BackDoor.Generic.1046
Win32/VB Microsoft BackDoor.Generic.1047
Win32/VB Microsoft Trojan.PWS.SPS.11
Win32/VB Microsoft Trojan.Wupsta
Win32/VB Microsoft FDOS.Yahoo
Win32/VB Microsoft Trojan.NoPop
Win32/VB Microsoft Trojan.MulDrop.2601
Win32/VB Microsoft Trojan.DownLoader.7319
Win32/VB Microsoft Trojan.DownLoader.14819
Win32/VB Microsoft Trojan.PWS.Tankist
Win32/VB Microsoft Trojan.DownLoader.14767
Win32/VB Microsoft Trojan.Parpa
Win32/VB Microsoft Trojan.MulDrop.14989
Win32/VB Microsoft BackDoor.Generic.930
Win32/VB Microsoft Trojan.PWS.Hothack
Win32/VB Microsoft Trojan.DownLoader.12143
Win32/VB Microsoft Trojan.AVKill.140
Win32/VB Microsoft BackDoor.Extenty
Win32/VB Microsoft Trojan.DownLoader.318
Win32/VB Microsoft BackDoor.Inclu
Win32/VB Microsoft Trojan.PWS.MSNSpy
Win32/VB Microsoft Trojan.AVKill.271
Win32/VB Microsoft Trojan.DownLoader.6814
Win32/VB Microsoft Trojan.DownLoader.9343
Win32/VB Microsoft Win32.HLLW.Studfan
Win32/VB Microsoft BackDoor.Demon

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.