Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Rbot aliases:

Name Vendor Dr.Web classification name
Win32/Rbot Microsoft BackDoor.IRC.Rizon
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.60
Win32/Rbot Microsoft BackDoor.IRC.JrxBot
Win32/Rbot Microsoft Win32.HLLW.MyBot.based
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.69
Win32/Rbot Microsoft Trojan.DownLoader.5270
Win32/Rbot Microsoft Win32.HLLW.MyBot
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1388
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1430
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.77
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.55
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.523
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1736
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.2733
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.517
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.947
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1916
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.954
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.87
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1068
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1603
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.68
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1720
Win32/Rbot Microsoft Trojan.Inject.384
Win32/Rbot Microsoft Trojan.Ranky
Win32/Rbot Microsoft BackDoor.Ninja
Win32/Rbot Microsoft Trojan.DownLoader.831
Win32/Rbot Microsoft BackDoor.Bifrost.655
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.3045
Win32/Rbot Microsoft Win32.IRC.Bot.based
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.2080
Win32/Rbot Microsoft Win32.HLLW.SpyBot.94
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1237
Win32/Rbot Microsoft Win32.HLLW.SpyBot.82
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1236
Win32/Rbot Microsoft Trojan.DownLoader.7053
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.3003
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.3051
Win32/Rbot Microsoft Win32.IRC.Bot
Win32/Rbot Microsoft Trojan.Click.17212
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.577
Win32/Rbot Microsoft Trojan.MulDrop.11668
Win32/Rbot Microsoft Trojan.MulDrop.3859
Win32/Rbot Microsoft Trojan.MulDrop.4164
Win32/Rbot Microsoft Trojan.MulDrop.4299
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.851
Win32/Rbot Microsoft Win32.Virut
Win32/Rbot Microsoft BackDoor.IRC.Rizzo
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.880
Win32/Rbot Microsoft BackDoor.IRC.Sdbot.1914

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.