Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWS:Win32/Zbot.J aliases:

Name Vendor Dr.Web classification name
PWS:Win32/Zbot.J Microsoft Trojan.PWS.Panda.160
PWS:Win32/Zbot.J Microsoft Trojan.PWS.Panda.114
PWS:Win32/Zbot.J Microsoft Trojan.MulDrop.30860
PWS:Win32/Zbot.J Microsoft Trojan.Packed.683
PWS:Win32/Zbot.J Microsoft Trojan.PWS.Panda.143
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.5853
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.5856
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6087
PWS:Win32/Zbot.J Microsoft Trojan.Packed.2463
PWS:Win32/Zbot.J Microsoft Trojan.Packed.366
PWS:Win32/Zbot.J Microsoft Trojan.Packed.19706
PWS:Win32/Zbot.J Microsoft Trojan.Packed.142
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.9823
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.10911
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6351
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6723
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.9209
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.9569
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6373
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.7062
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6739
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6714
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.9089
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.8140
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6356
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.8880
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.7983
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6454
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.7835
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6412
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.7800
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6805
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6799
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.10140
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.8459
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.8450
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6391
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.7297
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6502
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.9288
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.6494
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.7537
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.10145
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.9642
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.9974
PWS:Win32/Zbot.J Microsoft Trojan.Proxy.7267

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.