Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_HARNIG.GEN aliases:

Name Vendor Dr.Web classification name
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.750
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.286
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1697
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.6656
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.454
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.99
TROJ_HARNIG.GEN Trend Micro Trojan.Starter
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.5120
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1407
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.788
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.742
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.763
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.245
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.4608
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.244
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.864
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.284
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.685
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.794
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1070
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1051
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1588
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.820
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.801
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.909
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1748
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.6144
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.10240
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.325
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.557
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.7680
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.534
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.4608
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.929
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.644
TROJ_HARNIG.GEN Trend Micro Trojan.Harnig
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1946
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.9408
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.9733
TROJ_HARNIG.GEN Trend Micro Trojan.StartPage.1470
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.10330
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.11982
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.18979
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.27997
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.27785
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.30095
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.1165
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.23702
TROJ_HARNIG.GEN Trend Micro Trojan.DownLoader.50562

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.