Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32.Randex aliases:

Name Vendor Dr.Web classification name
W32.Randex Symantec Trojan.MulDrop.1814
W32.Randex Symantec Win32.HLLW.Sybot
W32.Randex Symantec BackDoor.IRC.Simplbot
W32.Randex Symantec BackDoor.IRC.Sdbot.5
W32.Randex Symantec BackDoor.IRC.Shiznic
W32.Randex Symantec BackDoor.IRC.Sdbot.266
W32.Randex Symantec Exploit.DCom.38
W32.Randex Symantec BackDoor.IRC.Sdbot.229
W32.Randex Symantec BackDoor.Hackamy
W32.Randex Symantec BackDoor.Ninja
W32.Randex Symantec Trojan.NtRootKit.40
W32.Randex Symantec Win32.HLLW.SpyBot.21
W32.Randex Symantec BackDoor.IRC.Sdbot.247
W32.Randex Symantec Trojan.Proxy
W32.Randex Symantec BackDoor.IRC.Sdbot.333
W32.Randex Symantec BackDoor.IRC.Sdbot.7
W32.Randex Symantec BackDoor.IRC.Sdbot.310
W32.Randex Symantec BackDoor.IRC.Sdbot.392
W32.Randex Symantec BackDoor.IRC.Sdbot.249
W32.Randex Symantec BackDoor.IRC.Sdbot.135
W32.Randex Symantec Win32.HLLW.Plug
W32.Randex Symantec BackDoor.IRC.Sdbot.295
W32.Randex Symantec BackDoor.IRC.Sdbot.294
W32.Randex Symantec BackDoor.IRC.Sdbot.293
W32.Randex Symantec BackDoor.IRC.Sdbot.220
W32.Randex Symantec BackDoor.IRC.Autobot
W32.Randex Symantec Win32.HLLW.Randi
W32.Randex Symantec BackDoor.IRC.Sdbot.260
W32.Randex Symantec BackDoor.Dumaru
W32.Randex Symantec Win32.Detox
W32.Randex Symantec BackDoor.IRC.Sdbot.228
W32.Randex Symantec Trojan.MulDrop.2267
W32.Randex Symantec BackDoor.IRC.Sdbot.115
W32.Randex Symantec BackDoor.IRC.Sdbot.378
W32.Randex Symantec BackDoor.IRC.Sdbot.381
W32.Randex Symantec BackDoor.IRC.Sdbot.118
W32.Randex Symantec Win32.HLLW.Randex.45056
W32.Randex Symantec Win32.HLLW.Shepher
W32.Randex Symantec Trojan.MulDrop.475
W32.Randex Symantec BackDoor.IRC.Sdbot.120
W32.Randex Symantec Win32.HLLW.Agobot
W32.Randex Symantec Win32.HLLW.ForBot
W32.Randex Symantec Trojan.Proxy.309
W32.Randex Symantec Trojan.Ranky
W32.Randex Symantec Trojan.Proxy.341
W32.Randex Symantec BackDoor.IRC.Sdbot.354
W32.Randex Symantec Win32.Detox.based
W32.Randex Symantec BackDoor.Oscar
W32.Randex Symantec BackDoor.IRC.Sdbot
W32.Randex Symantec Win32.HLLW.SpyBot

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.