Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Adware.Istbar aliases:

Name Vendor Dr.Web classification name
Adware.Istbar Symantec Trojan.MulDrop.1261
Adware.Istbar Symantec Trojan.DownLoader.689
Adware.Istbar Symantec BackDoor.Generic.112
Adware.Istbar Symantec Trojan.Isbar.262
Adware.Istbar Symantec Trojan.DownLoader.16384
Adware.Istbar Symantec Trojan.DownLoader.2061
Adware.Istbar Symantec Trojan.StartPage.706
Adware.Istbar Symantec Trojan.DownLoader.2596
Adware.Istbar Symantec Trojan.DownLoader.4256
Adware.Istbar Symantec Trojan.Isbar.132
Adware.Istbar Symantec Trojan.Isbar.220
Adware.Istbar Symantec Trojan.Click.68
Adware.Istbar Symantec Trojan.Isbar.79
Adware.Istbar Symantec Trojan.Click.104
Adware.Istbar Symantec Trojan.DownLoader.1161
Adware.Istbar Symantec Trojan.DownLoader.772
Adware.Istbar Symantec Trojan.Isbar.249
Adware.Istbar Symantec Trojan.Isbar.86
Adware.Istbar Symantec Trojan.DownLoader.1254
Adware.Istbar Symantec Trojan.DownLoader.332
Adware.Istbar Symantec Trojan.Isbar.151
Adware.Istbar Symantec Trojan.DownLoader.205
Adware.Istbar Symantec Trojan.Isbar.308
Adware.Istbar Symantec Trojan.Isbar.130
Adware.Istbar Symantec Trojan.Isbar.77
Adware.Istbar Symantec Trojan.Isbar.216
Adware.Istbar Symantec Trojan.Isbar.103
Adware.Istbar Symantec Trojan.Isbar.197
Adware.Istbar Symantec Trojan.Isbar.200
Adware.Istbar Symantec Trojan.Isbar.210
Adware.Istbar Symantec Trojan.DownLoader.2743
Adware.Istbar Symantec Trojan.DownLoader.2518
Adware.Istbar Symantec Trojan.DownLoader.2183
Adware.Istbar Symantec Trojan.Isbar.177
Adware.Istbar Symantec Trojan.Isbar.96
Adware.Istbar Symantec Trojan.Isbar.134
Adware.Istbar Symantec Trojan.Isbar.231
Adware.Istbar Symantec Trojan.Isbar.146
Adware.Istbar Symantec Trojan.Isbar.121
Adware.Istbar Symantec Trojan.Isbar.122
Adware.Istbar Symantec Trojan.Isbar.156
Adware.Istbar Symantec Trojan.Isbar.188
Adware.Istbar Symantec Trojan.Isbar.212
Adware.Istbar Symantec Trojan.Isbar.198
Adware.Istbar Symantec Trojan.Isbar.82
Adware.Istbar Symantec Trojan.Isbar.93
Adware.Istbar Symantec Trojan.Isbar.143
Adware.Istbar Symantec Trojan.DownLoader.595
Adware.Istbar Symantec Trojan.Isbar.68
Adware.Istbar Symantec Trojan.Isbar.81

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.