Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_SPYBOT.PA aliases:

Name Vendor Dr.Web classification name
WORM_SPYBOT.PA Trend Micro Win32.HLLW.SpyBot
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Wisdom
WORM_SPYBOT.PA Trend Micro BackDoor.GDoor.33
WORM_SPYBOT.PA Trend Micro Trojan.PWS.Jevan
WORM_SPYBOT.PA Trend Micro Trojan.PWS.Agent
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Rizzo
WORM_SPYBOT.PA Trend Micro Win32.HLLW.Balyz
WORM_SPYBOT.PA Trend Micro Win32.HLLM.Zokrim.32768
WORM_SPYBOT.PA Trend Micro BackDoor.Haslo
WORM_SPYBOT.PA Trend Micro Win32.HLLP.Hanta.9728
WORM_SPYBOT.PA Trend Micro BackDoor.Pahac.14
WORM_SPYBOT.PA Trend Micro Trojan.ProAgent.10
WORM_SPYBOT.PA Trend Micro Trojan.PWS.Snagger
WORM_SPYBOT.PA Trend Micro Win32.HLLW.Licia
WORM_SPYBOT.PA Trend Micro Trojan.DownLoader.13131
WORM_SPYBOT.PA Trend Micro Win32.HLLW.Morpheus.3
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Deflt
WORM_SPYBOT.PA Trend Micro Trojan.PWS.Banker.137
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Sdbot.based
WORM_SPYBOT.PA Trend Micro Win32.HLLW.Morpheus.2
WORM_SPYBOT.PA Trend Micro Win32.HLLM.Yaha.63744
WORM_SPYBOT.PA Trend Micro Trojan.PWS.Tabiki
WORM_SPYBOT.PA Trend Micro Trojan.KeyLogger.552
WORM_SPYBOT.PA Trend Micro BackDoor.Destructor.21
WORM_SPYBOT.PA Trend Micro Trojan.PWS.Banker.1886
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Vofla
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Sdbot.2197
WORM_SPYBOT.PA Trend Micro Trojan.MulDrop.1300
WORM_SPYBOT.PA Trend Micro Trojan.PWS.LDPinch.245
WORM_SPYBOT.PA Trend Micro Trojan.AVKill
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Simplbot
WORM_SPYBOT.PA Trend Micro BackDoor.IRC.Servon
WORM_SPYBOT.PA Trend Micro Trojan.MulDrop.2903
WORM_SPYBOT.PA Trend Micro Program.Vskeylogger
WORM_SPYBOT.PA Trend Micro Win32.HLLW.Melder
WORM_SPYBOT.PA Trend Micro Win32.HLLW.Gavir.72
WORM_SPYBOT.PA Trend Micro Win32.HLLP.PissOff.36864
WORM_SPYBOT.PA Trend Micro Win32.HLLW.MyBot.5314
WORM_SPYBOT.PA Trend Micro Win32.HLLP.Fedot
WORM_SPYBOT.PA Trend Micro Trojan.PWS.Wow
WORM_SPYBOT.PA Trend Micro BackDoor.Optix.13
WORM_SPYBOT.PA Trend Micro Win32.HLLW.Pirog
WORM_SPYBOT.PA Trend Micro Win32.HLLW.MyBot.4793
WORM_SPYBOT.PA Trend Micro Win32.Voodoo.7045
WORM_SPYBOT.PA Trend Micro Win32.HLLP.Bora.11264
WORM_SPYBOT.PA Trend Micro Win32.IRC.Bot.based

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.