Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/VB aliases:

Name Vendor Dr.Web classification name
Win32/VB Microsoft Win32.HLLW.Autoruner
Win32/VB Microsoft Trojan.DownLoader.2048
Win32/VB Microsoft Win32.HLLM.Updater
Win32/VB Microsoft Trojan.Outwar.36864
Win32/VB Microsoft Joke.CrazyTyping
Win32/VB Microsoft Trojan.PWS.Mmmp
Win32/VB Microsoft Trojan.PWS.Lord
Win32/VB Microsoft BackDoor.Generic.1267
Win32/VB Microsoft BackDoor.Generic.1297
Win32/VB Microsoft BackDoor.IRC.Zombie
Win32/VB Microsoft BackDoor.Generic.1282
Win32/VB Microsoft Win32.HLLM.Minima
Win32/VB Microsoft Win32.HLLW.Chain
Win32/VB Microsoft Trojan.Zhaol
Win32/VB Microsoft Trojan.MulDrop.857
Win32/VB Microsoft Trojan.DownLoader.4494
Win32/VB Microsoft DDoS.Kardraw
Win32/VB Microsoft Trojan.PWS.Aolbill
Win32/VB Microsoft Win32.HLLW.Toggo
Win32/VB Microsoft BackDoor.Generic.1035
Win32/VB Microsoft BackDoor.Generic.1327
Win32/VB Microsoft BackDoor.Generic.1460
Win32/VB Microsoft Win32.HLLW.Generic.30
Win32/VB Microsoft Win32.HLLW.Generic.148
Win32/VB Microsoft Trojan.Necrobie
Win32/VB Microsoft Trojan.WMSteal
Win32/VB Microsoft Trojan.PWS.MStory
Win32/VB Microsoft Trojan.Rune
Win32/VB Microsoft Trojan.Sheng
Win32/VB Microsoft Trojan.Starter.74
Win32/VB Microsoft Trojan.PWS.Zhaang
Win32/VB Microsoft BackDoor.Sksock
Win32/VB Microsoft Trojan.Mediac
Win32/VB Microsoft Trojan.DownLoader.4849
Win32/VB Microsoft Trojan.DownLoader.3181
Win32/VB Microsoft Trojan.DownLoader.3532
Win32/VB Microsoft Trojan.DownLoader.7399
Win32/VB Microsoft Trojan.Prutec
Win32/VB Microsoft Trojan.Click.17417
Win32/VB Microsoft Trojan.Corruptor
Win32/VB Microsoft Trojan.Helner
Win32/VB Microsoft Trojan.DownLoader.3320
Win32/VB Microsoft Trojan.DownLoader.3562
Win32/VB Microsoft Trojan.DownLoader.3349
Win32/VB Microsoft Trojan.DownLoader.3745
Win32/VB Microsoft Trojan.DownLoader.24308
Win32/VB Microsoft Trojan.DownLoader.9880
Win32/VB Microsoft Trojan.DownLoader.14720
Win32/VB Microsoft Trojan.DownLoader.7077
Win32/VB Microsoft Trojan.DownLoader.46062

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.