Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/SDBot!Backdoor!Server.Vari aliases:

Name Vendor Dr.Web classification name
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.JnxBot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Monk
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Autobot
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Amaru
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Randex
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Anime
Win32/SDBot!Backdoor!Server.Vari Computer Associates IRC.Flood
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Tongbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.Serman
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.EggDrop.24
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Xtreme
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Serbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.338
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Vegas
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.220
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.230
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.3
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.BlastIt.1
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.Iroffer.13
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.Tongbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.BlueEye.20
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.284
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Dbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Nmbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.328
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.ForBot
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.SpyBot.18
Win32/SDBot!Backdoor!Server.Vari Computer Associates Trojan.MulDrop.2658
Win32/SDBot!Backdoor!Server.Vari Computer Associates Trojan.MulDrop.590
Win32/SDBot!Backdoor!Server.Vari Computer Associates Trojan.MulDrop.1321
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.12
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Jbbot.21
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Pimpbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates Trojan.MulDrop.1655
Win32/SDBot!Backdoor!Server.Vari Computer Associates Trojan.MulDrop.2054
Win32/SDBot!Backdoor!Server.Vari Computer Associates Trojan.MulDrop.2267
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.242
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.414
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.75
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Aebot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Dotblue
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.231
Win32/SDBot!Backdoor!Server.Vari Computer Associates Trojan.MulDrop.581
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Jrbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Sdbot.52
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.IRC.Buhbot
Win32/SDBot!Backdoor!Server.Vari Computer Associates BackDoor.Dong
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Randex.60416
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Scanbot.11
Win32/SDBot!Backdoor!Server.Vari Computer Associates Win32.HLLW.Konslbot

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.