Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/VB aliases:

Name Vendor Dr.Web classification name
Win32/VB Microsoft BackDoor.Generic.1593
Win32/VB Microsoft BackDoor.Funmaker
Win32/VB Microsoft BackDoor.Generic.1590
Win32/VB Microsoft BackDoor.Aciid
Win32/VB Microsoft Win32.HLLW.Autoruner.142
Win32/VB Microsoft Win32.HLLW.Autoruner.156
Win32/VB Microsoft Trojan.DownLoader.9119
Win32/VB Microsoft Trojan.DownLoader.6400
Win32/VB Microsoft Trojan.PWS.Bancos.82
Win32/VB Microsoft Trojan.DownLoader.15208
Win32/VB Microsoft Trojan.DownLoader.15887
Win32/VB Microsoft BackDoor.Generic.1341
Win32/VB Microsoft BackDoor.Generic.1345
Win32/VB Microsoft BackDoor.Eclipse.11
Win32/VB Microsoft BackDoor.IRC.Davux
Win32/VB Microsoft BackDoor.Generic.1197
Win32/VB Microsoft BackDoor.Generic.1221
Win32/VB Microsoft BackDoor.Generic.1218
Win32/VB Microsoft BackDoor.Generic.1202
Win32/VB Microsoft Trojan.KeyLogger.1007
Win32/VB Microsoft Trojan.KeyLogger.1006
Win32/VB Microsoft Trojan.DownLoader.23047
Win32/VB Microsoft Trojan.PWS.Bancos.178
Win32/VB Microsoft Trojan.PWS.Progetto
Win32/VB Microsoft Trojan.DownLoader.5521
Win32/VB Microsoft Trojan.DownLoader.5187
Win32/VB Microsoft BackDoor.Pix
Win32/VB Microsoft BackDoor.Shnapz
Win32/VB Microsoft Trojan.KillFiles.465
Win32/VB Microsoft Win32.HLLW.Iranian
Win32/VB Microsoft BackDoor.Sniper
Win32/VB Microsoft BackDoor.Generic.1074
Win32/VB Microsoft Trojan.Shua
Win32/VB Microsoft BackDoor.Tkrew
Win32/VB Microsoft BackDoor.Generic.1070
Win32/VB Microsoft Trojan.MulDrop.2600
Win32/VB Microsoft BackDoor.Islamic
Win32/VB Microsoft Trojan.DownLoader.3952
Win32/VB Microsoft BackDoor.Olimp
Win32/VB Microsoft Trojan.Underattack
Win32/VB Microsoft BackDoor.Generic.1075
Win32/VB Microsoft Trojan.Proxy.449
Win32/VB Microsoft BackDoor.Overload.10
Win32/VB Microsoft BackDoor.Generic.1069
Win32/VB Microsoft BackDoor.Generic.1076
Win32/VB Microsoft Trojan.DownLoader.3896
Win32/VB Microsoft BackDoor.Generic.1071
Win32/VB Microsoft BackDoor.Quixley
Win32/VB Microsoft BackDoor.Generic.1072
Win32/VB Microsoft Trojan.Spiderman

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.