FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Hijacker.Gen aliases:

Name Vendor Dr.Web classification name
TR/Hijacker.Gen Avira Trojan.DownLoader.56752
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.1027
TR/Hijacker.Gen Avira BackDoor.CmjSpy.84
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.5139
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.5404
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.5567
TR/Hijacker.Gen Avira Trojan.Proxy.3113
TR/Hijacker.Gen Avira BackDoor.BotSiggen.7
TR/Hijacker.Gen Avira Trojan.Maby.120
TR/Hijacker.Gen Avira Trojan.Maby.122
TR/Hijacker.Gen Avira Trojan.Gado.2
TR/Hijacker.Gen Avira Trojan.Maby.119
TR/Hijacker.Gen Avira Trojan.Maby.150
TR/Hijacker.Gen Avira Win32.HLLP.Kles
TR/Hijacker.Gen Avira Trojan.StartPage.784
TR/Hijacker.Gen Avira Trojan.DownLoader.20785
TR/Hijacker.Gen Avira Trojan.MulDrop.12607
TR/Hijacker.Gen Avira Trojan.MulDrop.1665
TR/Hijacker.Gen Avira Win32.HLLW.Autoruner.1739
TR/Hijacker.Gen Avira Win32.HLLW.Autoruner.1247
TR/Hijacker.Gen Avira Win32.HLLW.Rubbish.5
TR/Hijacker.Gen Avira Trojan.DownLoader.44972
TR/Hijacker.Gen Avira Trojan.Ywov
TR/Hijacker.Gen Avira Trojan.Maby.22
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2472
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2455
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2456
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.5577
TR/Hijacker.Gen Avira Trojan.Maby
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.5634
TR/Hijacker.Gen Avira Trojan.DnsChange
TR/Hijacker.Gen Avira Trojan.DownLoader.21459
TR/Hijacker.Gen Avira Trojan.MulDrop.5780
TR/Hijacker.Gen Avira Trojan.Inject.523
TR/Hijacker.Gen Avira Trojan.Spambot
TR/Hijacker.Gen Avira Trojan.Vanti
TR/Hijacker.Gen Avira Trojan.Woda
TR/Hijacker.Gen Avira Trojan.Maby.24
TR/Hijacker.Gen Avira Trojan.Proxy.3215
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.4906
TR/Hijacker.Gen Avira Trojan.Maby.76
TR/Hijacker.Gen Avira Trojan.Maby.8
TR/Hijacker.Gen Avira BackDoor.Unique.1
TR/Hijacker.Gen Avira Trojan.MulDrop.17840
TR/Hijacker.Gen Avira Trojan.MulDrop.6466
TR/Hijacker.Gen Avira Trojan.DownLoader.8567
TR/Hijacker.Gen Avira Trojan.DownLoader.49563
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.3939
TR/Hijacker.Gen Avira Trojan.Wix
TR/Hijacker.Gen Avira Trojan.Litter

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies