Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm.gen.h aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm.gen.h McAfee Trojan.MulDrop.1813
W32/Sdbot.worm.gen.h McAfee Trojan.MulDrop.1814
W32/Sdbot.worm.gen.h McAfee Trojan.MulDrop.1815
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.134
W32/Sdbot.worm.gen.h McAfee BackDoor.PeepView.202
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.138
W32/Sdbot.worm.gen.h McAfee Win32.HLLW.Dedler
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Tsbot
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Wisdom
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.347
W32/Sdbot.worm.gen.h McAfee Trojan.MulDrop.2054
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.300
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.301
W32/Sdbot.worm.gen.h McAfee Trojan.Accido
W32/Sdbot.worm.gen.h McAfee BackDoor.Ninja
W32/Sdbot.worm.gen.h McAfee Win32.Parite.2
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.150
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.382
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.330
W32/Sdbot.worm.gen.h McAfee Win32.HLLW.Agobot
W32/Sdbot.worm.gen.h McAfee Win32.Detox
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Ebot
W32/Sdbot.worm.gen.h McAfee Exploit.Lsas
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.87
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.324
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.372
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.321
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.68
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.378
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.331
W32/Sdbot.worm.gen.h McAfee Trojan.Fuzen
W32/Sdbot.worm.gen.h McAfee Trojan.DragonBot
W32/Sdbot.worm.gen.h McAfee Win32.HLLW.SpyBot
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.429
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.439
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.406
W32/Sdbot.worm.gen.h McAfee Win32.IRC.Bot
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.400
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.383
W32/Sdbot.worm.gen.h McAfee BackDoor.Oscar
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.166
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.133
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.83
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.137
W32/Sdbot.worm.gen.h McAfee BackDoor.IRC.Sdbot.based
W32/Sdbot.worm.gen.h McAfee Win32.HLLW.ForBot
W32/Sdbot.worm.gen.h McAfee Win32.HLLM.MyDoom.77
W32/Sdbot.worm.gen.h McAfee Win32.HLLW.MyBot
W32/Sdbot.worm.gen.h McAfee Win32.HLLW.MyBot.based

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.