Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.407
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.535
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.47
W32/Sdbot.worm McAfee Trojan.PWS.Spy.1806
W32/Sdbot.worm McAfee Trojan.DownLoader1.38279
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.7514
W32/Sdbot.worm McAfee Trojan.MulDrop.36094
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.6718
W32/Sdbot.worm McAfee Trojan.MulDrop1.20861
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5755
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.497
W32/Sdbot.worm McAfee BackDoor.Siggen.987
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5480
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5816
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.601
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.10134
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.11417
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5460
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.11300
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5410
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.50
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5465
W32/Sdbot.worm McAfee Trojan.StatBlasterAd.5
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.433
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5440
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.10740
W32/Sdbot.worm McAfee Trojan.Siggen.6791
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.435
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.10273
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.83
W32/Sdbot.worm McAfee Trojan.Inject.15415
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.11194
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.6704
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.81
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5471
W32/Sdbot.worm McAfee BackDoor.Cia.1866
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.98
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5458
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.442
W32/Sdbot.worm McAfee Trojan.DownLoader1.35921
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.122
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5796
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.10279
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5473
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.75
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.10548
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.913
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5485
W32/Sdbot.worm McAfee Win32.HLLW.Agobot.871
W32/Sdbot.worm McAfee Trojan.MulDrop1.54950

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.