Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/VB aliases:

Name Vendor Dr.Web classification name
Win32/VB Microsoft BackDoor.Generic.1208
Win32/VB Microsoft BackDoor.Generic.1037
Win32/VB Microsoft BackDoor.Generic.1451
Win32/VB Microsoft Trojan.PWS.QQDragon
Win32/VB Microsoft Trojan.DownLoader.3504
Win32/VB Microsoft BackDoor.Hydra
Win32/VB Microsoft Trojan.PWS.Tencent
Win32/VB Microsoft Trojan.Favourite
Win32/VB Microsoft Trojan.KeyLogger.538
Win32/VB Microsoft Trojan.Moutrap
Win32/VB Microsoft Trojan.DownLoader.6109
Win32/VB Microsoft BackDoor.Tnt
Win32/VB Microsoft Trojan.Click.634
Win32/VB Microsoft Trojan.Click.646
Win32/VB Microsoft BackDoor.Generic.1088
Win32/VB Microsoft BackDoor.Generic.1087
Win32/VB Microsoft BackDoor.IRC.Helmut
Win32/VB Microsoft BackDoor.Woool
Win32/VB Microsoft BackDoor.Generic.1111
Win32/VB Microsoft BackDoor.Thud
Win32/VB Microsoft BackDoor.Generic.1104
Win32/VB Microsoft BackDoor.Toy
Win32/VB Microsoft Trojan.MulDrop.5740
Win32/VB Microsoft Trojan.MulDrop.5739
Win32/VB Microsoft Trojan.DownLoader.607
Win32/VB Microsoft Trojan.Crush
Win32/VB Microsoft Nuke.BrosTeam
Win32/VB Microsoft BackDoor.Pccwin
Win32/VB Microsoft Trojan.Ukleo
Win32/VB Microsoft Trojan.DownLoader.3032
Win32/VB Microsoft Trojan.DownLoader.3143
Win32/VB Microsoft Trojan.DownLoader.3177
Win32/VB Microsoft Trojan.Haks
Win32/VB Microsoft Trojan.DownLoader.3148
Win32/VB Microsoft Trojan.DownLoader.3273
Win32/VB Microsoft Trojan.DownLoader.2975
Win32/VB Microsoft Trojan.DownLoader.3213
Win32/VB Microsoft Trojan.AVKill.416
Win32/VB Microsoft Trojan.Click.16666
Win32/VB Microsoft Trojan.DownLoader.39224
Win32/VB Microsoft Trojan.DownLoader.40557
Win32/VB Microsoft Trojan.DownLoader.39284
Win32/VB Microsoft Win32.HLLM.Generic.327
Win32/VB Microsoft Win32.HLLM.Generic.323
Win32/VB Microsoft BackDoor.Generic.781
Win32/VB Microsoft Trojan.PWS.Harvester.15
Win32/VB Microsoft Trojan.Click.678
Win32/VB Microsoft Trojan.DownLoader.4439
Win32/VB Microsoft Trojan.DownLoader.4400
Win32/VB Microsoft Trojan.DownLoader

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.