Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Biblioteca de virus

El análisis de tecnologías usadas por los malintencionados nos permite sacar conclusiones sobre los posibles vectores de desarrollo de la industria antivirus y afrontar las futuras amenazas con mayor eficacia. Entérese de cómo funcionan varios programas nocivos en sistemas infectados y cómo afrontarlo.

BehavesLike:Win32.ExplorerHijack aliases:

Name Vendor Dr.Web classification name
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Iespy
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Spambot.2703
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.4831
BehavesLike:Win32.ExplorerHijack BitDefender BackDoor.Srvman
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.6864
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30823
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.32710
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.32009
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.4708
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.20844
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.52324
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.52511
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.23177
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoad.44
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.1974
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.703
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.KeyLogger.440
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Mayouch
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.59
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.60
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.PWS.Wsgame.4441
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.19422
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.84
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.50
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.121
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.76
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.46
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.48
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.MulDrop.16713
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.Inject.276
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.23762
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.23773
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.73
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.57
BehavesLike:Win32.ExplorerHijack BitDefender BackDoor.Bulknet.222
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.74
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Medbod.55
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.28740
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.48600
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.52456
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30157
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30191
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30117
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30180
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30143
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30137
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.30036
BehavesLike:Win32.ExplorerHijack BitDefender Win32.HLLW.Autoruner.1891
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.29808
BehavesLike:Win32.ExplorerHijack BitDefender Trojan.DownLoader.29824

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

Vulnerabilidades para Android

Según las estadísticas, cada quinto programa para el SO Android tiene vulnerabilidades, lo cual les permite a los malintencionados implementar los troyanos móviles en el dispositivo y realizar las acciones necesarias.

Auditor de seguridad en Dr.Web para Android diagnosticará y analizará la seguridad de un dispositivo móvil, ofrecerá soluciones para resolver los problemas y las vulnerabilidades encontrados.