Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BehavesLike:Win32.ExplorerHijack aliases:

Name Vendor Dr.Web classification name
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Iespy
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Spambot.2703
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.4831
BehavesLike:Win32.ExplorerHijack BitDefender BackDoor.Srvman
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.6864
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30823
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.32710
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.32009
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.4708
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.20844
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.52324
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.52511
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.23177
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoad.44
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.1974
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.703
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.KeyLogger.440
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Mayouch
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.59
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.60
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.PWS.Wsgame.4441
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.19422
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.84
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.50
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.121
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.76
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.46
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.48
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.MulDrop.16713
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.276
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.23762
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.23773
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.73
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.57
BehavesLike:Win32.ExplorerHijack BitDefender BackDoor.Bulknet.222
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.74
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.55
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.28740
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.48600
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.52456
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30157
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30191
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30117
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30180
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30143
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30137
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30036
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Autoruner.1891
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.29808
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.29824

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.