Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32.Spybot.Worm aliases:

Name Vendor Dr.Web classification name
W32.Spybot.Worm Symantec Win32.Spelac.1008
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.358
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.340
W32.Spybot.Worm Symantec Trojan.MulDrop.1620
W32.Spybot.Worm Symantec BackDoor.Generic.603
W32.Spybot.Worm Symantec BackDoor.Iroffer.1213
W32.Spybot.Worm Symantec Win32.HLLW.Jrbot
W32.Spybot.Worm Symantec Win32.HLLW.Serbot
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.80
W32.Spybot.Worm Symantec Exploit.DCom.38
W32.Spybot.Worm Symantec Exploit.MS04-011
W32.Spybot.Worm Symantec Win32.Weird.10240
W32.Spybot.Worm Symantec Win32.HLLW.SpyBot.30
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.281
W32.Spybot.Worm Symantec Trojan.MulDrop.623
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.343
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.351
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.397
W32.Spybot.Worm Symantec Win32.HLLW.SpyBot.24
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.405
W32.Spybot.Worm Symantec BackDoor.IRC.Nmbot
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.356
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.337
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.309
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.328
W32.Spybot.Worm Symantec Trojan.NtRootKit.40
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.149
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.140
W32.Spybot.Worm Symantec Trojan.MulDrop.574
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.297
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.314
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.121
W32.Spybot.Worm Symantec Win32.HLLW.Aimal
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.298
W32.Spybot.Worm Symantec BackDoor.IRC.SpyBot
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.109
W32.Spybot.Worm Symantec BackDoor.IRC.Xbot
W32.Spybot.Worm Symantec Trojan.MulDrop.2191
W32.Spybot.Worm Symantec BackDoor.GizmoSpy
W32.Spybot.Worm Symantec Trojan.Ranky
W32.Spybot.Worm Symantec Trojan.MulDrop.1470
W32.Spybot.Worm Symantec Trojan.Proxy.83
W32.Spybot.Worm Symantec Trojan.MulDrop.1697
W32.Spybot.Worm Symantec BackDoor.IRC.Jbbot.21
W32.Spybot.Worm Symantec BackDoor.IRC.Pimpbot
W32.Spybot.Worm Symantec Trojan.MulDrop.590
W32.Spybot.Worm Symantec Trojan.MulDrop.582
W32.Spybot.Worm Symantec BackDoor.IRC.Veritas
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.436
W32.Spybot.Worm Symantec BackDoor.IRC.Sdbot.52

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.