FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Hijacker.Gen aliases:

Name Vendor Dr.Web classification name
TR/Hijacker.Gen Avira Win32.HLLW.SpyBot.84
TR/Hijacker.Gen Avira Trojan.DownLoader.13044
TR/Hijacker.Gen Avira Trojan.MulDrop.4270
TR/Hijacker.Gen Avira Trojan.MulDrop.4544
TR/Hijacker.Gen Avira Trojan.DownLoader.14404
TR/Hijacker.Gen Avira Trojan.MulDrop.4483
TR/Hijacker.Gen Avira Trojan.MulDrop.4505
TR/Hijacker.Gen Avira Trojan.Inject.159
TR/Hijacker.Gen Avira Win32.HLLW.Autoruner.1524
TR/Hijacker.Gen Avira Trojan.Click.624
TR/Hijacker.Gen Avira Win32.HLLW.Autoruner.3731
TR/Hijacker.Gen Avira Trojan.Proxy.1198
TR/Hijacker.Gen Avira Trojan.DownLoader.14936
TR/Hijacker.Gen Avira Trojan.DownLoader.14669
TR/Hijacker.Gen Avira Trojan.MulDrop.4436
TR/Hijacker.Gen Avira Adware.BestOffers
TR/Hijacker.Gen Avira Trojan.DownLoader.14498
TR/Hijacker.Gen Avira Trojan.MulDrop.4593
TR/Hijacker.Gen Avira Trojan.MulDrop.4507
TR/Hijacker.Gen Avira Trojan.MulDrop.4614
TR/Hijacker.Gen Avira Trojan.Fakealert.214
TR/Hijacker.Gen Avira Trojan.MulDrop.4527
TR/Hijacker.Gen Avira Trojan.MulDrop.4482
TR/Hijacker.Gen Avira Trojan.MulDrop.4504
TR/Hijacker.Gen Avira Trojan.MulDrop.4554
TR/Hijacker.Gen Avira BackDoor.Bifrost.52
TR/Hijacker.Gen Avira Trojan.MulDrop.4561
TR/Hijacker.Gen Avira Trojan.MulDrop.4570
TR/Hijacker.Gen Avira Win32.HLLW.Autoruner.2807
TR/Hijacker.Gen Avira Trojan.MulDrop.4595
TR/Hijacker.Gen Avira Trojan.MulDrop.2507
TR/Hijacker.Gen Avira Trojan.Inject.173
TR/Hijacker.Gen Avira Trojan.Inject.174
TR/Hijacker.Gen Avira Trojan.DownLoader.14908
TR/Hijacker.Gen Avira Trojan.MulDrop.4296
TR/Hijacker.Gen Avira Trojan.MulDrop.4381
TR/Hijacker.Gen Avira Trojan.PWS.LDPinch.1234
TR/Hijacker.Gen Avira Trojan.DownLoader.15155
TR/Hijacker.Gen Avira BackDoor.MCYo
TR/Hijacker.Gen Avira Trojan.DownLoader.1715
TR/Hijacker.Gen Avira Trojan.StealthDown
TR/Hijacker.Gen Avira BackDoor.CmjSpy
TR/Hijacker.Gen Avira BackDoor.Tiny.30
TR/Hijacker.Gen Avira BackDoor.IcmpCmd.117
TR/Hijacker.Gen Avira Trojan.DownLoader.2710
TR/Hijacker.Gen Avira Trojan.DownLoader.2604
TR/Hijacker.Gen Avira BackDoor.Polax
TR/Hijacker.Gen Avira Trojan.Stuf
TR/Hijacker.Gen Avira Trojan.Hooker.29184
TR/Hijacker.Gen Avira Trojan.PWS.QQSpy

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies