Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Spy.ZBot.NY aliases:

Name Vendor Dr.Web classification name
TR/Spy.ZBot.NY Avira BackDoor.Qbot.72
TR/Spy.ZBot.NY Avira BackDoor.Qbot.51
TR/Spy.ZBot.NY Avira Trojan.PWS.Siggen.10304
TR/Spy.ZBot.NY Avira Trojan.PWS.SpySweep.35
TR/Spy.ZBot.NY Avira BackDoor.Qbot.66
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.387
TR/Spy.ZBot.NY Avira BackDoor.Qbot.64
TR/Spy.ZBot.NY Avira Trojan.DownLoader1.37780
TR/Spy.ZBot.NY Avira Trojan.Proxy.18728
TR/Spy.ZBot.NY Avira Trojan.Proxy.18712
TR/Spy.ZBot.NY Avira Trojan.DownLoader1.35847
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.383
TR/Spy.ZBot.NY Avira Trojan.DownLoader1.39970
TR/Spy.ZBot.NY Avira BackDoor.Qbot.55
TR/Spy.ZBot.NY Avira Trojan.Proxy.18618
TR/Spy.ZBot.NY Avira Trojan.Inject.13153
TR/Spy.ZBot.NY Avira BackDoor.Qbot.58
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.490
TR/Spy.ZBot.NY Avira Trojan.Proxy.18737
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.460
TR/Spy.ZBot.NY Avira Trojan.DownLoader1.37424
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.538
TR/Spy.ZBot.NY Avira Trojan.Proxy.18727
TR/Spy.ZBot.NY Avira Trojan.PWS.Siggen.9573
TR/Spy.ZBot.NY Avira BackDoor.Qbot.57
TR/Spy.ZBot.NY Avira Trojan.DownLoader1.37082
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.547
TR/Spy.ZBot.NY Avira Trojan.Siggen1.64032
TR/Spy.ZBot.NY Avira Trojan.Proxy.18777
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.122
TR/Spy.ZBot.NY Avira Trojan.Proxy.18732
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.171
TR/Spy.ZBot.NY Avira Trojan.Proxy.18785
TR/Spy.ZBot.NY Avira Trojan.Proxy.18631
TR/Spy.ZBot.NY Avira Trojan.Packed.21176
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.549
TR/Spy.ZBot.NY Avira Trojan.Click1.27266
TR/Spy.ZBot.NY Avira Trojan.PWS.Panda.550
TR/Spy.ZBot.NY Avira Trojan.FakeAV.1509
TR/Spy.ZBot.NY Avira BackDoor.Qbot.67
TR/Spy.ZBot.NY Avira Trojan.DownLoader1.39363
TR/Spy.ZBot.NY Avira BackDoor.Butter.23
TR/Spy.ZBot.NY Avira Trojan.Proxy.18804
TR/Spy.ZBot.NY Avira Trojan.PWS.Siggen.10351
TR/Spy.ZBot.NY Avira Trojan.Inject.14127
TR/Spy.ZBot.NY Avira Trojan.Proxy.18755
TR/Spy.ZBot.NY Avira Trojan.DownLoader1.35862
TR/Spy.ZBot.NY Avira Trojan.Siggen2.8354
TR/Spy.ZBot.NY Avira Trojan.Proxy.18746
TR/Spy.ZBot.NY Avira Trojan.Proxy.18776

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.