FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Hijacker.Gen aliases:

Name Vendor Dr.Web classification name
TR/Hijacker.Gen Avira Trojan.MulDrop1.325
TR/Hijacker.Gen Avira Trojan.Click.17096
TR/Hijacker.Gen Avira BackDoor.Bifrost.74
TR/Hijacker.Gen Avira Trojan.DownLoader.9161
TR/Hijacker.Gen Avira Trojan.KeyLogger.119
TR/Hijacker.Gen Avira Trojan.MulDrop1.303
TR/Hijacker.Gen Avira Trojan.MulDrop1.333
TR/Hijacker.Gen Avira BackDoor.Bulknet.320
TR/Hijacker.Gen Avira Trojan.NtRootKit.127
TR/Hijacker.Gen Avira Dialer.Riprov
TR/Hijacker.Gen Avira Trojan.Proxy.2879
TR/Hijacker.Gen Avira Trojan.DownLoad.46296
TR/Hijacker.Gen Avira BackDoor.PcClient.878
TR/Hijacker.Gen Avira Trojan.DownLoader.37631
TR/Hijacker.Gen Avira Trojan.PWS.LDPinch.1483
TR/Hijacker.Gen Avira Trojan.MulDrop.29450
TR/Hijacker.Gen Avira Trojan.DownLoader.31615
TR/Hijacker.Gen Avira Trojan.Wulin
TR/Hijacker.Gen Avira BackDoor.ProRat.33
TR/Hijacker.Gen Avira Trojan.DownLoader.31612
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.13763
TR/Hijacker.Gen Avira Trojan.MulDrop.34647
TR/Hijacker.Gen Avira Trojan.Spambot.4117
TR/Hijacker.Gen Avira BackDoor.Havar
TR/Hijacker.Gen Avira Trojan.ZKeyLog
TR/Hijacker.Gen Avira Trojan.DownLoad.7651
TR/Hijacker.Gen Avira Trojan.DownLoader.3358
TR/Hijacker.Gen Avira Trojan.Inject.716
TR/Hijacker.Gen Avira Trojan.MulDrop.8238
TR/Hijacker.Gen Avira Trojan.DownLoader.55095
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.13257
TR/Hijacker.Gen Avira Trojan.PWS.Wsgame.13092
TR/Hijacker.Gen Avira Trojan.PWS.Gamania.19221
TR/Hijacker.Gen Avira BackDoor.Leniv
TR/Hijacker.Gen Avira Adware.DollarRevenue.211
TR/Hijacker.Gen Avira Trojan.Siggen1.6677
TR/Hijacker.Gen Avira Trojan.PWS.Panda.171
TR/Hijacker.Gen Avira Trojan.MulDrop.12903
TR/Hijacker.Gen Avira Trojan.Packed.162
TR/Hijacker.Gen Avira Trojan.PWS.Qqpass.3090
TR/Hijacker.Gen Avira BackDoor.Zxshell
TR/Hijacker.Gen Avira Trojan.PWS.Snap
TR/Hijacker.Gen Avira Trojan.Siggen.57180
TR/Hijacker.Gen Avira Trojan.DownLoader.37044
TR/Hijacker.Gen Avira Trojan.Siggen.61205
TR/Hijacker.Gen Avira Trojan.Siggen.63671
TR/Hijacker.Gen Avira Trojan.Siggen.56106
TR/Hijacker.Gen Avira Trojan.Siggen.62122
TR/Hijacker.Gen Avira Trojan.Siggen.58001
TR/Hijacker.Gen Avira Trojan.Siggen.56764

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies