Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/VB aliases:

Name Vendor Dr.Web classification name
Win32/VB Microsoft BackDoor.Azzur
Win32/VB Microsoft Trojan.DelWin.25090
Win32/VB Microsoft BackDoor.Servidor
Win32/VB Microsoft Trojan.Click.1182
Win32/VB Microsoft Trojan.Click.1180
Win32/VB Microsoft BackDoor.Rethin
Win32/VB Microsoft Trojan.Click.1188
Win32/VB Microsoft BackDoor.Yuri
Win32/VB Microsoft Trojan.Click.1184
Win32/VB Microsoft Trojan.Cakero
Win32/VB Microsoft Trojan.Copyself
Win32/VB Microsoft Trojan.PWS.Bancos.206
Win32/VB Microsoft Trojan.PWS.Bancos.187
Win32/VB Microsoft Trojan.AVKill.317
Win32/VB Microsoft Trojan.DownLoader.11060
Win32/VB Microsoft Trojan.DownLoader.10765
Win32/VB Microsoft Win32.HLLW.Banshee
Win32/VB Microsoft Win32.HLLW.Pytica
Win32/VB Microsoft Trojan.MulDrop.4344
Win32/VB Microsoft Trojan.DownLoader.1124
Win32/VB Microsoft Trojan.Javad
Win32/VB Microsoft Trojan.Click.2313
Win32/VB Microsoft Trojan.Click.529
Win32/VB Microsoft Trojan.DownLoader.9481
Win32/VB Microsoft Trojan.DownLoader.8450
Win32/VB Microsoft Trojan.DownLoader.7409
Win32/VB Microsoft Win32.HLLW.Hware
Win32/VB Microsoft Trojan.DownLoader.20180
Win32/VB Microsoft Trojan.DownLoader.13007
Win32/VB Microsoft Trojan.Starter.175
Win32/VB Microsoft Trojan.Smirl
Win32/VB Microsoft Trojan.Space
Win32/VB Microsoft Trojan.DownLoader.24714
Win32/VB Microsoft Adware.Bagon
Win32/VB Microsoft Win32.HLLW.Dinos
Win32/VB Microsoft Win32.HLLW.Plus
Win32/VB Microsoft Win32.HLLW.Steam
Win32/VB Microsoft BackDoor.Netian
Win32/VB Microsoft Trojan.PWS.Best
Win32/VB Microsoft Win32.HLLM.Generic.412
Win32/VB Microsoft Trojan.DownLoader.36468
Win32/VB Microsoft Win32.HLLW.Texmer.37
Win32/VB Microsoft Win32.HLLW.Imager
Win32/VB Microsoft Trojan.DownLoader.35765
Win32/VB Microsoft BackDoor.ProRat
Win32/VB Microsoft Trojan.DownLoader.48887
Win32/VB Microsoft Trojan.DownLoader.5247
Win32/VB Microsoft Trojan.MulDrop.4656
Win32/VB Microsoft Trojan.MulDrop.5683
Win32/VB Microsoft Trojan.Kaza

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.