Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Hijacker.Gen aliases:

Name Vendor Dr.Web classification name
TR/Hijacker.Gen Avira BackDoor.Terminal
TR/Hijacker.Gen Avira Trojan.PWS.GoldSpy.2577
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.12131
TR/Hijacker.Gen Avira Trojan.Inject.302
TR/Hijacker.Gen Avira BackDoor.Nuclear.37
TR/Hijacker.Gen Avira Trojan.Inject.5512
TR/Hijacker.Gen Avira Trojan.DownLoader.10848
TR/Hijacker.Gen Avira Trojan.DownLoad.30085
TR/Hijacker.Gen Avira Win32.HLLW.Autoruner.6840
TR/Hijacker.Gen Avira BackDoor.Haxdoor.318
TR/Hijacker.Gen Avira BackDoor.Teh
TR/Hijacker.Gen Avira Trojan.WinSpy.126
TR/Hijacker.Gen Avira Trojan.Maby.19
TR/Hijacker.Gen Avira Win32.HLLW.Autoruner.1005
TR/Hijacker.Gen Avira Win32.HLLP.Whboy.91
TR/Hijacker.Gen Avira Trojan.DownLoader.38025
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.10305
TR/Hijacker.Gen Avira Trojan.DownLoader.38396
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.6515
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.6286
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.6175
TR/Hijacker.Gen Avira Trojan.Maby.20
TR/Hijacker.Gen Avira Trojan.DownLoader.46216
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2444
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2438
TR/Hijacker.Gen Avira Trojan.MulDrop.3350
TR/Hijacker.Gen Avira Trojan.MulDrop.11738
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.5013
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.4920
TR/Hijacker.Gen Avira Trojan.Inject.3257
TR/Hijacker.Gen Avira Trojan.MulDrop.1355
TR/Hijacker.Gen Avira Trojan.DownLoader.14236
TR/Hijacker.Gen Avira Trojan.DownLoader.29812
TR/Hijacker.Gen Avira Trojan.Proxy.3093
TR/Hijacker.Gen Avira Trojan.MulDrop.8384
TR/Hijacker.Gen Avira Trojan.DownLoad.2048
TR/Hijacker.Gen Avira Trojan.DownLoader.23614
TR/Hijacker.Gen Avira Trojan.MulDrop.6287
TR/Hijacker.Gen Avira Trojan.Litter.49
TR/Hijacker.Gen Avira Trojan.Inject.251
TR/Hijacker.Gen Avira Trojan.MulDrop.16200
TR/Hijacker.Gen Avira Trojan.MulDrop.4545
TR/Hijacker.Gen Avira BackDoor.Bech
TR/Hijacker.Gen Avira Trojan.MulDrop.3564
TR/Hijacker.Gen Avira BackDoor.Haxdoor.365
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2442
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2457
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2469
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2427
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.3042

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.