Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32.ExplorerHijack aliases:

Name Vendor Dr.Web classification name
Win32.ExplorerHijack BitDefender Trojan.MulDrop.3637
Win32.ExplorerHijack BitDefender Trojan.DownLoader.9103
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6816
Win32.ExplorerHijack BitDefender Trojan.Popuper
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6864
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6863
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6841
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6830
Win32.ExplorerHijack BitDefender Win32.HLLM.Sacho
Win32.ExplorerHijack BitDefender Trojan.MulDrop.3276
Win32.ExplorerHijack BitDefender BackDoor.Pigeon.180
Win32.ExplorerHijack BitDefender BackDoor.Bifrost.38
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6780
Win32.ExplorerHijack BitDefender Trojan.PWS.LDPinch.732
Win32.ExplorerHijack BitDefender BackDoor.Suicide
Win32.ExplorerHijack BitDefender Dialer.CabeDialer
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6765
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6331
Win32.ExplorerHijack BitDefender Trojan.Fakealert
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6276
Win32.ExplorerHijack BitDefender BackDoor.IRC.Ali
Win32.ExplorerHijack BitDefender Trojan.Inject.45
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6479
Win32.ExplorerHijack BitDefender BackDoor.Nuclear.31
Win32.ExplorerHijack BitDefender Trojan.PWS.LDPinch.661
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6272
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6526
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6529
Win32.ExplorerHijack BitDefender Trojan.Infos
Win32.ExplorerHijack BitDefender BackDoor.Chen
Win32.ExplorerHijack BitDefender BackDoor.Image
Win32.ExplorerHijack BitDefender BackDoor.Lolo
Win32.ExplorerHijack BitDefender Trojan.MulDrop.3224
Win32.ExplorerHijack BitDefender Trojan.MulDrop.3265
Win32.ExplorerHijack BitDefender BackDoor.Mithril
Win32.ExplorerHijack BitDefender Trojan.MulDrop.3220
Win32.ExplorerHijack BitDefender Trojan.PWS.Pasdev
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6725
Win32.ExplorerHijack BitDefender BackDoor.Uragan
Win32.ExplorerHijack BitDefender Trojan.Proxy.685
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6589
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6456
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6746
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6181
Win32.ExplorerHijack BitDefender BackDoor.Bifrost.35
Win32.ExplorerHijack BitDefender BackDoor.Nuclear.33
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6287
Win32.ExplorerHijack BitDefender BackDoor.Sicklebot
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6562
Win32.ExplorerHijack BitDefender Trojan.DownLoader.6421

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.