Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Generic.b.worm aliases:

Name Vendor Dr.Web classification name
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.62
W32/Generic.b.worm McAfee BackDoor.IRC.Zet
W32/Generic.b.worm McAfee BackDoor.IRC.Skan
W32/Generic.b.worm McAfee Win32.HLLW.LoveSan.based
W32/Generic.b.worm McAfee BackDoor.IRC.Afbot
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.247
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.161
W32/Generic.b.worm McAfee Win32.HLLW.Anite
W32/Generic.b.worm McAfee BackDoor.IrcContact
W32/Generic.b.worm McAfee Win32.HLLW.SpyBot.15
W32/Generic.b.worm McAfee BackDoor.IRC.Netbot
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.86
W32/Generic.b.worm McAfee Win32.HLLM.Avril.53248
W32/Generic.b.worm McAfee Win32.HLLM.Avril.3
W32/Generic.b.worm McAfee Win32.HLLW.Hooked
W32/Generic.b.worm McAfee BackDoor.IRC.Simplbot
W32/Generic.b.worm McAfee BackDoor.IRC.Xoce
W32/Generic.b.worm McAfee BackDoor.IRC.Tehoc
W32/Generic.b.worm McAfee Win32.HLLW.Shepher
W32/Generic.b.worm McAfee BackDoor.IRC.HellBot
W32/Generic.b.worm McAfee BackDoor.IRC.Moo
W32/Generic.b.worm McAfee BackDoor.IRC.Die
W32/Generic.b.worm McAfee BackDoor.IRC.Wisdom
W32/Generic.b.worm McAfee Win32.HLLW.SpyBot
W32/Generic.b.worm McAfee BackDoor.IRC.Whisper
W32/Generic.b.worm McAfee Win32.IRC.Bot.based
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.523
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.543
W32/Generic.b.worm McAfee BackDoor.Oscar
W32/Generic.b.worm McAfee BackDoor.IRC.Xbot
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.676
W32/Generic.b.worm McAfee BackDoor.IRC.Rxbot
W32/Generic.b.worm McAfee BackDoor.IRC.Dbot
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.1137
W32/Generic.b.worm McAfee BackDoor.IRC.Blah
W32/Generic.b.worm McAfee BackDoor.IRC.Tiny
W32/Generic.b.worm McAfee BackDoor.IRC.Tiny.19
W32/Generic.b.worm McAfee BackDoor.IRC.Mailx
W32/Generic.b.worm McAfee BackDoor.Aphex.12
W32/Generic.b.worm McAfee Win32.HLLW.Autoruner.981
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.1716
W32/Generic.b.worm McAfee BackDoor.IRC.Linkbot
W32/Generic.b.worm McAfee Trojan.DownLoader.50658
W32/Generic.b.worm McAfee BackDoor.IRC.Sbot.24
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.451
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.1189
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.1091
W32/Generic.b.worm McAfee BackDoor.IRC.Epoch
W32/Generic.b.worm McAfee BackDoor.IRC.Dezbot
W32/Generic.b.worm McAfee BackDoor.IRC.Sdbot.1715

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.