Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/FakeRean aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4709
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4124
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4193
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4192
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4209
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4736
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4216
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5464
TrojanDownloader:Win32/FakeRean Microsoft Trojan.MulDrop.31412
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.1475
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4431
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5089
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5015
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4747
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Packed.2463
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4534
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Packed.366
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4510
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5312
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4411
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5064
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.1208
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Packed.683
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5049
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Packed.196
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4416
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4648
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5301
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4907
TrojanDownloader:Win32/FakeRean Microsoft Trojan.DownLoad1.43105
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4630
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5217
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.origin
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4651
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.4973
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5013
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5256
TrojanDownloader:Win32/FakeRean Microsoft Trojan.DownLoad.50013
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5115
TrojanDownloader:Win32/FakeRean Microsoft Trojan.DownLoad.48040
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.3921
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Siggen.5214
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5443
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5237
TrojanDownloader:Win32/FakeRean Microsoft Trojan.DownLoad.50150
TrojanDownloader:Win32/FakeRean Microsoft Trojan.DownLoad.49170
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5311
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Siggen.5219
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5016
TrojanDownloader:Win32/FakeRean Microsoft Trojan.Fakealert.5437

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.