Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWS:Win32/Zbot.GA aliases:

Name Vendor Dr.Web classification name
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.31
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.4
PWS:Win32/Zbot.GA Microsoft Trojan.Packed.119
PWS:Win32/Zbot.GA Microsoft Trojan.Packed.122
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.27
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.18
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3683
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.12
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.30
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.51
PWS:Win32/Zbot.GA Microsoft Trojan.Packed.124
PWS:Win32/Zbot.GA Microsoft Trojan.Packed.120
PWS:Win32/Zbot.GA Microsoft Trojan.Packed.511
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.11
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3737
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.6189
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.6188
PWS:Win32/Zbot.GA Microsoft Trojan.Packed.142
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.21
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3201
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.13
PWS:Win32/Zbot.GA Microsoft Trojan.Siggen.1846
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3782
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3215
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.28
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.29
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.5924
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3209
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3212
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.3221
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.91
PWS:Win32/Zbot.GA Microsoft Trojan.Packed.424
PWS:Win32/Zbot.GA Microsoft Trojan.PWS.Panda.98
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13165
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13125
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13279
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13218
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13133
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13229
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13149
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13289
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13130
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13106
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13157
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13174
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.13227
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.4002
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.4946
PWS:Win32/Zbot.GA Microsoft Trojan.Proxy.4474
PWS:Win32/Zbot.GA Microsoft Trojan.DownLoad1.39838

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.