Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_SPYBOT.MCS aliases:

Name Vendor Dr.Web classification name
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.7968
WORM_SPYBOT.MCS Trend Micro Trojan.Packed.393
WORM_SPYBOT.MCS Trend Micro Win32.HLLW.Autohit.6614
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.15890
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.11135
WORM_SPYBOT.MCS Trend Micro Trojan.DownLoader.33587
WORM_SPYBOT.MCS Trend Micro Trojan.Xor
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.3309
WORM_SPYBOT.MCS Trend Micro Trojan.PWS.LDPinch.3212
WORM_SPYBOT.MCS Trend Micro BackDoor.Bifrost.805
WORM_SPYBOT.MCS Trend Micro BackDoor.Goth.11
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.2157
WORM_SPYBOT.MCS Trend Micro Trojan.DownLoader.62991
WORM_SPYBOT.MCS Trend Micro Trojan.KeyLogger.1779
WORM_SPYBOT.MCS Trend Micro Trojan.PWS.Banker.22222
WORM_SPYBOT.MCS Trend Micro Win32.HLLW.MyBot
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.3289
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.13329
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.2158
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.3563
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.3308
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.8379
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.13408
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Nagas
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.2916
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.2907
WORM_SPYBOT.MCS Trend Micro Trojan.DownLoader.62364
WORM_SPYBOT.MCS Trend Micro BackDoor.ProRat.254
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.3045
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Rxbot
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.3300
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.10877
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.7451
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Sdbot.1337
WORM_SPYBOT.MCS Trend Micro Trojan.Click.4818
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.17090
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Nite
WORM_SPYBOT.MCS Trend Micro BackDoor.FireOn
WORM_SPYBOT.MCS Trend Micro BackDoor.FireOn.10
WORM_SPYBOT.MCS Trend Micro Trojan.MulDrop.14468
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Nite.10
WORM_SPYBOT.MCS Trend Micro BackDoor.IRC.Tiny.21
WORM_SPYBOT.MCS Trend Micro BackDoor.PeepView.202
WORM_SPYBOT.MCS Trend Micro Trojan.DownLoad.27777
WORM_SPYBOT.MCS Trend Micro BackDoor.Flux.141
WORM_SPYBOT.MCS Trend Micro Trojan.DownLoader.54614
WORM_SPYBOT.MCS Trend Micro Trojan.DownLoader.50754
WORM_SPYBOT.MCS Trend Micro Trojan.Inject.251
WORM_SPYBOT.MCS Trend Micro Trojan.DownLoader.65436
WORM_SPYBOT.MCS Trend Micro Win32.HLLW.Autoruner.1879

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.