Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee Trojan.PWS.Banker.4785
W32/Sdbot.worm McAfee Win32.HLLW.Autoruner.2013
W32/Sdbot.worm McAfee BackDoor.IRC.Former
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2064
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2887
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2555
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3156
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2509
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2814
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1918
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2691
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1475
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1304
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.677
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.954
W32/Sdbot.worm McAfee BackDoor.Wowish
W32/Sdbot.worm McAfee Win32.HLLM.Beagle.45142
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1628
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1117
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.505
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2914
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1826
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1391
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1979
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.837
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1009
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1985
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.899
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2842
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1731
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.506
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.511
W32/Sdbot.worm McAfee Trojan.DownLoader.49845
W32/Sdbot.worm McAfee Trojan.MulDrop.10218
W32/Sdbot.worm McAfee Win32.HLLW.Autoruner.1732
W32/Sdbot.worm McAfee Trojan.MulDrop.7900
W32/Sdbot.worm McAfee BackDoor.IRC.Play
W32/Sdbot.worm McAfee Trojan.Packed.181
W32/Sdbot.worm McAfee Trojan.Ranky.40457
W32/Sdbot.worm McAfee Trojan.DownLoader.27746
W32/Sdbot.worm McAfee Trojan.DownLoader.27886
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2082
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1631
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2094
W32/Sdbot.worm McAfee BackDoor.IRC.SiN
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.70
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1662
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1665
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1659
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1660

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.