Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Rbot aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Rbot Microsoft Trojan.PWS.Banker.1544
Backdoor:Win32/Rbot Microsoft Trojan.MulDrop.4013
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.3972
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.2178
Backdoor:Win32/Rbot Microsoft Win32.HLLW.SpyBot.64
Backdoor:Win32/Rbot Microsoft Trojan.MulDrop.5079
Backdoor:Win32/Rbot Microsoft BackDoor.Optix.13
Backdoor:Win32/Rbot Microsoft BackDoor.Ninja
Backdoor:Win32/Rbot Microsoft Win32.HLLW.MyBot.225
Backdoor:Win32/Rbot Microsoft Trojan.MulDrop.4995
Backdoor:Win32/Rbot Microsoft BackDoor.Ser.4
Backdoor:Win32/Rbot Microsoft BackDoor.Xrat.33
Backdoor:Win32/Rbot Microsoft BackDoor.Pigeon.7888
Backdoor:Win32/Rbot Microsoft Exploit.DCom.56
Backdoor:Win32/Rbot Microsoft Win32.HLLW.Autoruner.826
Backdoor:Win32/Rbot Microsoft BackDoor.Xdoor.351
Backdoor:Win32/Rbot Microsoft Trojan.Inject.523
Backdoor:Win32/Rbot Microsoft Trojan.MulDrop.10856
Backdoor:Win32/Rbot Microsoft Win32.IRC.Bot.based
Backdoor:Win32/Rbot Microsoft Win32.IRC.Bot
Backdoor:Win32/Rbot Microsoft Trojan.Packed.142
Backdoor:Win32/Rbot Microsoft BackDoor.Bifrost.655
Backdoor:Win32/Rbot Microsoft Trojan.MulDrop.5643
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1117
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.661
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.663
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.347
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.523
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.2750
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.139
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.936
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Rxbot
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1916
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.166
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.385
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.150
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.984
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.654
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.2418
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.472
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.161
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.471
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.475
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.2219
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.400
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.909
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.664
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.912
Backdoor:Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1315

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.