Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/IRCbot aliases:

Name Vendor Dr.Web classification name
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1425
Win32/IRCbot Microsoft BackDoor.IRC.Skan
Win32/IRCbot Microsoft Win32.HLLW.Blad
Win32/IRCbot Microsoft BackDoor.IRC.Drix
Win32/IRCbot Microsoft Win32.HLLW.Pepbot
Win32/IRCbot Microsoft BackDoor.IRC.Omega
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1355
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.2556
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.2418
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.2461
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1239
Win32/IRCbot Microsoft Win32.HLLW.SpyBot.83
Win32/IRCbot Microsoft Win32.IRC.Bot.84
Win32/IRCbot Microsoft Trojan.MulDrop.10633
Win32/IRCbot Microsoft Trojan.MulDrop.4995
Win32/IRCbot Microsoft BackDoor.IRC.Sunbot
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.2434
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.103
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1123
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1733
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.626
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1910
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1714
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1452
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.867
Win32/IRCbot Microsoft BackDoor.IRC.Fonk
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.877
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.864
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.863
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.1464
Win32/IRCbot Microsoft Win32.HLLW.Tjspec.11
Win32/IRCbot Microsoft Trojan.PWS.LDPinch.1693
Win32/IRCbot Microsoft Win32.HLLW.Iwa
Win32/IRCbot Microsoft BackDoor.Snus
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.823
Win32/IRCbot Microsoft BackDoor.IRC.Lsd
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.342
Win32/IRCbot Microsoft BackDoor.IRC.Netbot
Win32/IRCbot Microsoft BackDoor.IRC.Idiot
Win32/IRCbot Microsoft BackDoor.IRC.Psybot
Win32/IRCbot Microsoft BackDoor.IRC.Woopbot
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.based
Win32/IRCbot Microsoft BackDoor.IRC.Sdbot.168
Win32/IRCbot Microsoft BackDoor.IRC.Amata
Win32/IRCbot Microsoft BackDoor.Pigeon.174
Win32/IRCbot Microsoft BackDoor.IRC.Former
Win32/IRCbot Microsoft Win32.HLLW.SpyBot.62
Win32/IRCbot Microsoft Win32.Detox
Win32/IRCbot Microsoft Win32.Legion
Win32/IRCbot Microsoft BackDoor.IRC.Manix

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.