Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/VB aliases:

Name Vendor Dr.Web classification name
Win32/VB Microsoft BackDoor.Generic.1286
Win32/VB Microsoft BackDoor.Generic.690
Win32/VB Microsoft BackDoor.Lither
Win32/VB Microsoft BackDoor.Generic.1295
Win32/VB Microsoft Trojan.DownLoader.17363
Win32/VB Microsoft BackDoor.Werner
Win32/VB Microsoft Trojan.DownLoader.4668
Win32/VB Microsoft Trojan.MulDrop.2063
Win32/VB Microsoft Trojan.Pinkdot
Win32/VB Microsoft Trojan.Parche
Win32/VB Microsoft Trojan.DownLoader.13886
Win32/VB Microsoft Win32.HLLW.Generic.99
Win32/VB Microsoft Trojan.DownLoader.14428
Win32/VB Microsoft Trojan.DownLoader.13911
Win32/VB Microsoft Trojan.DownLoader.17519
Win32/VB Microsoft Trojan.DownLoader.13507
Win32/VB Microsoft Trojan.Joker
Win32/VB Microsoft Trojan.PWS.Generic
Win32/VB Microsoft Win32.HLLW.Kolek
Win32/VB Microsoft Trojan.DownLoader.3707
Win32/VB Microsoft Trojan.DownLoader.6094
Win32/VB Microsoft Trojan.KeyLogger.782
Win32/VB Microsoft Trojan.DownLoader.14208
Win32/VB Microsoft Trojan.DownLoader.5669
Win32/VB Microsoft Trojan.DownLoader.6927
Win32/VB Microsoft Trojan.DownLoader.51817
Win32/VB Microsoft Trojan.DownLoader.12720
Win32/VB Microsoft Trojan.Esd
Win32/VB Microsoft Trojan.DownLoader.2763
Win32/VB Microsoft Trojan.DownLoader.2630
Win32/VB Microsoft BackDoor.Generic.750
Win32/VB Microsoft Trojan.DownLoader.6969
Win32/VB Microsoft BackDoor.Generic.1392
Win32/VB Microsoft BackDoor.Generic.971
Win32/VB Microsoft BackDoor.Generic.674
Win32/VB Microsoft Trojan.DownLoader.2777
Win32/VB Microsoft BackDoor.Generic.822
Win32/VB Microsoft Trojan.DownLoader.2707
Win32/VB Microsoft Win32.HLLC.Hunt
Win32/VB Microsoft BackDoor.NetAdmin.131
Win32/VB Microsoft BackDoor.Generic.745
Win32/VB Microsoft BackDoor.RedZone
Win32/VB Microsoft Win32.HLLW.Unjap
Win32/VB Microsoft Trojan.DownLoader.19640
Win32/VB Microsoft BackDoor.Generic.1383
Win32/VB Microsoft BackDoor.MSNRat.29
Win32/VB Microsoft BackDoor.Zinyth
Win32/VB Microsoft BackDoor.Cedrich
Win32/VB Microsoft Win32.HLLW.Tom
Win32/VB Microsoft Trojan.PWS.Mark

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.