FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Hijacker.Gen aliases:

Name Vendor Dr.Web classification name
TR/Hijacker.Gen Avira Trojan.DownLoader.64116
TR/Hijacker.Gen Avira Trojan.Proxy.3325
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.2560
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.3093
TR/Hijacker.Gen Avira Trojan.Inject.3633
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.5036
TR/Hijacker.Gen Avira Trojan.DownLoader.25772
TR/Hijacker.Gen Avira Trojan.DownLoader.24017
TR/Hijacker.Gen Avira Trojan.DownLoader.19256
TR/Hijacker.Gen Avira BackDoor.WebDor
TR/Hijacker.Gen Avira Trojan.Maby.23
TR/Hijacker.Gen Avira Trojan.DownLoader.18653
TR/Hijacker.Gen Avira Trojan.DownLoader.18634
TR/Hijacker.Gen Avira Trojan.Maby.9
TR/Hijacker.Gen Avira BackDoor.IRC.Shabot
TR/Hijacker.Gen Avira Trojan.DownLoader.18422
TR/Hijacker.Gen Avira Trojan.DownLoader.18786
TR/Hijacker.Gen Avira Trojan.DownLoader.32136
TR/Hijacker.Gen Avira Trojan.MulDrop.18281
TR/Hijacker.Gen Avira Trojan.Proxy.2776
TR/Hijacker.Gen Avira BackDoor.Darkstorm
TR/Hijacker.Gen Avira Trojan.DownLoader.10304
TR/Hijacker.Gen Avira Trojan.MulDrop.14696
TR/Hijacker.Gen Avira Trojan.DownLoader.54561
TR/Hijacker.Gen Avira Trojan.PWS.Lineage.3757
TR/Hijacker.Gen Avira Trojan.PWS.Lineage.3759
TR/Hijacker.Gen Avira BackDoor.BotSiggen.8
TR/Hijacker.Gen Avira Trojan.DownLoad.27633
TR/Hijacker.Gen Avira Trojan.DownLoad.27524
TR/Hijacker.Gen Avira Trojan.DownLoad.27801
TR/Hijacker.Gen Avira BackDoor.Jimbras
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2010
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2009
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.1993
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2008
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2007
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.1962
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2006
TR/Hijacker.Gen Avira BackDoor.IRC.Sdbot.2014
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.7016
TR/Hijacker.Gen Avira BackDoor.Uragan
TR/Hijacker.Gen Avira BackDoor.AFX.21
TR/Hijacker.Gen Avira BackDoor.Fiam
TR/Hijacker.Gen Avira Trojan.MulDrop.5687
TR/Hijacker.Gen Avira Trojan.MulDrop.5539
TR/Hijacker.Gen Avira Trojan.DownLoader.59056
TR/Hijacker.Gen Avira Trojan.DownLoader.57583
TR/Hijacker.Gen Avira Trojan.Armin
TR/Hijacker.Gen Avira Trojan.DownLoader.19101
TR/Hijacker.Gen Avira Trojan.DownLoader.18940

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies