Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BehavesLike:Trojan.TaskDisabler aliases:

Name Vendor Dr.Web classification name
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.56219
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.QQLove
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Blockin
BehavesLike:Trojan.TaskDisabler BitDefender Adware.BusMedia.145
BehavesLike:Trojan.TaskDisabler BitDefender Adware.BusMedia.144
BehavesLike:Trojan.TaskDisabler BitDefender Adware.BusMedia.143
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.32539
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.43098
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.49553
BehavesLike:Trojan.TaskDisabler BitDefender Win32.HLLW.Theman
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.56220
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.35299
BehavesLike:Trojan.TaskDisabler BitDefender Adware.BusMedia.75
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.29722
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.6624
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.6617
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.6609
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.6615
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.6596
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Fakealert.1178
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.5228
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.47029
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.46530
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Antinu
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Disabler
BehavesLike:Trojan.TaskDisabler BitDefender BackDoor.IRC.Sdbot.591
BehavesLike:Trojan.TaskDisabler BitDefender Win32.HLLW.Autoruner.2159
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.32540
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.KeyLogger.383
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoad.520
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoad.523
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoad.527
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.46527
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Disabler.15
BehavesLike:Trojan.TaskDisabler BitDefender BackDoor.Hazz
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.PWS.Banker.10600
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.6826
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.5099
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.5035
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.PWS.Banker.11615
BehavesLike:Trojan.TaskDisabler BitDefender Win32.HLLW.Autoruner.2083
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.DownLoader.15786
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.5050
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Popuper.5042
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.KeyLogger.538
BehavesLike:Trojan.TaskDisabler BitDefender BackDoor.Bobi.50
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Click.19096
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Click.19094
BehavesLike:Trojan.TaskDisabler BitDefender Trojan.Click.19093

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.