FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Hijacker.Gen aliases:

Name Vendor Dr.Web classification name
TR/Hijacker.Gen Avira Trojan.MulDrop.33572
TR/Hijacker.Gen Avira Trojan.DownLoader.33587
TR/Hijacker.Gen Avira Trojan.MulDrop.origin
TR/Hijacker.Gen Avira Win32.HLLM.Lovgate.1
TR/Hijacker.Gen Avira Trojan.PWS.Wow.1479
TR/Hijacker.Gen Avira Trojan.Inject.3608
TR/Hijacker.Gen Avira Trojan.PWS.Wow.1477
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.13473
TR/Hijacker.Gen Avira Trojan.PWS.Wow.1478
TR/Hijacker.Gen Avira Trojan.DownLoader.8436
TR/Hijacker.Gen Avira Trojan.DownLoad.26617
TR/Hijacker.Gen Avira BackDoor.PSClient.6
TR/Hijacker.Gen Avira BackDoor.IRC.Barat
TR/Hijacker.Gen Avira Trojan.Starter.281
TR/Hijacker.Gen Avira BackDoor.Beizhu.2487
TR/Hijacker.Gen Avira Trojan.PWS.Legmir.2804
TR/Hijacker.Gen Avira Win32.HLLP.Whboy
TR/Hijacker.Gen Avira Trojan.DownLoader.51303
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot
TR/Hijacker.Gen Avira Trojan.MulDrop1.4850
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2645
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.11452
TR/Hijacker.Gen Avira Trojan.MulDrop1.4184
TR/Hijacker.Gen Avira Trojan.PWS.Wulin
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.9077
TR/Hijacker.Gen Avira Trojan.Click.26474
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.6100
TR/Hijacker.Gen Avira BackDoor.Pigeon.22223
TR/Hijacker.Gen Avira Trojan.DownLoad.34727
TR/Hijacker.Gen Avira BackDoor.Turkojan.97
TR/Hijacker.Gen Avira Trojan.MulDrop1.4491
TR/Hijacker.Gen Avira BackDoor.Poison.1021
TR/Hijacker.Gen Avira Trojan.MulDrop.33368
TR/Hijacker.Gen Avira Trojan.Hooker.153
TR/Hijacker.Gen Avira BackDoor.Winsta
TR/Hijacker.Gen Avira BackDoor.CmjSpy.13
TR/Hijacker.Gen Avira Trojan.MulDrop1.4953
TR/Hijacker.Gen Avira Trojan.DownLoader.27738
TR/Hijacker.Gen Avira Trojan.MulDrop1.4553
TR/Hijacker.Gen Avira Trojan.DownLoad.12579
TR/Hijacker.Gen Avira Trojan.Inject.3413
TR/Hijacker.Gen Avira Trojan.DownLoad.35775
TR/Hijacker.Gen Avira Trojan.DownLoad.39924
TR/Hijacker.Gen Avira Trojan.Swizzor.4351
TR/Hijacker.Gen Avira Trojan.DownLoad.39908
TR/Hijacker.Gen Avira Trojan.Proxy.6075
TR/Hijacker.Gen Avira Trojan.DownLoad.39937
TR/Hijacker.Gen Avira Trojan.DownLoad.39925
TR/Hijacker.Gen Avira Trojan.PWS.Legmir.origin
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.12360

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies