Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Worm:Win32/Spybot aliases:

Name Vendor Dr.Web classification name
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot.58
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot.88
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot
Worm:Win32/Spybot Microsoft Trojan.PWS.LDPinch.133
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.431
Worm:Win32/Spybot Microsoft BackDoor.Graybird
Worm:Win32/Spybot Microsoft BackDoor.Flux.114
Worm:Win32/Spybot Microsoft BackDoor.Huai.478
Worm:Win32/Spybot Microsoft Trojan.Hooker.162
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.770
Worm:Win32/Spybot Microsoft BackDoor.Pigeon.798
Worm:Win32/Spybot Microsoft Trojan.DownLoader.12353
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.2746
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.921
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.1276
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot.31
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot.28
Worm:Win32/Spybot Microsoft Trojan.MulDrop.2990
Worm:Win32/Spybot Microsoft Trojan.MulDrop.566
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.3796
Worm:Win32/Spybot Microsoft Trojan.PWS.LDPinch.134
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.1716
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.1715
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.434
Worm:Win32/Spybot Microsoft Win32.HLLW.Sbnet
Worm:Win32/Spybot Microsoft BackDoor.Graybird.2043
Worm:Win32/Spybot Microsoft BackDoor.Hackamy
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.based
Worm:Win32/Spybot Microsoft Trojan.DownLoader.4317
Worm:Win32/Spybot Microsoft Trojan.MulDrop.590
Worm:Win32/Spybot Microsoft Trojan.MulDrop.4164
Worm:Win32/Spybot Microsoft Trojan.MulDrop.2763
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.909
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.1758
Worm:Win32/Spybot Microsoft Win32.IRC.Bot.based
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.1132
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.1186
Worm:Win32/Spybot Microsoft BackDoor.Pigeon.797
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot.77
Worm:Win32/Spybot Microsoft BackDoor.Beizhu
Worm:Win32/Spybot Microsoft Trojan.Egor
Worm:Win32/Spybot Microsoft BackDoor.IRC.Sdbot.795
Worm:Win32/Spybot Microsoft BackDoor.LPain
Worm:Win32/Spybot Microsoft Trojan.DownLoader.22579
Worm:Win32/Spybot Microsoft BackDoor.IRC.Aollog
Worm:Win32/Spybot Microsoft BackDoor.Huai.448
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot.42
Worm:Win32/Spybot Microsoft Win32.HLLW.Agobot
Worm:Win32/Spybot Microsoft Win32.HLLW.SpyBot.57

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.