Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee Trojan.NtRootKit.350
W32/Sdbot.worm McAfee Trojan.MulDrop.8477
W32/Sdbot.worm McAfee BackDoor.WinMerd
W32/Sdbot.worm McAfee Trojan.MulDrop.8319
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.873
W32/Sdbot.worm McAfee Trojan.MulDrop.9014
W32/Sdbot.worm McAfee Win32.HLLW.Gotrob
W32/Sdbot.worm McAfee Win32.HLLM.Beagle.45152
W32/Sdbot.worm McAfee Trojan.MulDrop.4686
W32/Sdbot.worm McAfee Adware.MediaMotor
W32/Sdbot.worm McAfee Trojan.DownLoader.47411
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1627
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1667
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1630
W32/Sdbot.worm McAfee BackDoor.IRC.Clus
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1265
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1255
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1275
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1267
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1258
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1266
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1287
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1268
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1339
W32/Sdbot.worm McAfee Trojan.MulDrop.12389
W32/Sdbot.worm McAfee Trojan.MulDrop.13823
W32/Sdbot.worm McAfee Win32.HLLW.Nexact
W32/Sdbot.worm McAfee Trojan.MulDrop.9029
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2602
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1809
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1837
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1802
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1806
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1844
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1807
W32/Sdbot.worm McAfee BackDoor.IRC.Evil
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1820
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.912
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1413
W32/Sdbot.worm McAfee BackDoor.IRC.Janky
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2732
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2540
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1018
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2439
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1253
W32/Sdbot.worm McAfee Trojan.Proxy.122
W32/Sdbot.worm McAfee Trojan.Proxy.594
W32/Sdbot.worm McAfee Trojan.Lomita
W32/Sdbot.worm McAfee Trojan.StartPage.20854
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3148

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.