Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_JOLEEE.ZA aliases:

Name Vendor Dr.Web classification name
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4509
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4579
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4572
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4578
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4559
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4561
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4571
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4582
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4576
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Autoruner.6317
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4811
WORM_JOLEEE.ZA Trend Micro Trojan.Packed.682
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4494
WORM_JOLEEE.ZA Trend Micro Trojan.Spambot.4590
WORM_JOLEEE.ZA Trend Micro Trojan.MulDrop.32613
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4812
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Autoruner.6326
WORM_JOLEEE.ZA Trend Micro Trojan.Packed.2526
WORM_JOLEEE.ZA Trend Micro Trojan.Spambot.4331
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4703
WORM_JOLEEE.ZA Trend Micro Trojan.MulDrop.32046
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Lime.17
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4615
WORM_JOLEEE.ZA Trend Micro Trojan.MulDrop.32655
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Autoruner.7152
WORM_JOLEEE.ZA Trend Micro Trojan.PWS.Multi.35
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4604
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4552
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4859
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4741
WORM_JOLEEE.ZA Trend Micro Trojan.Spambot.4615
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Autoruner.7153
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Autoruner.6825
WORM_JOLEEE.ZA Trend Micro Trojan.DownLoad.41551
WORM_JOLEEE.ZA Trend Micro Trojan.DownLoad.35035
WORM_JOLEEE.ZA Trend Micro Trojan.PWS.LDPinch.4308
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Facebook.147
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Autoruner.7234
WORM_JOLEEE.ZA Trend Micro Win32.HLLW.Autoruner.7158
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4547
WORM_JOLEEE.ZA Trend Micro Trojan.Fakealert.4627

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.