Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Hijack.B aliases:

Name Vendor Dr.Web classification name
TR/Hijack.B Avira Trojan.DownLoader.36107
TR/Hijack.B Avira Trojan.DownLoader.36093
TR/Hijack.B Avira Trojan.DownLoader.36135
TR/Hijack.B Avira Trojan.DownLoader.36090
TR/Hijack.B Avira Trojan.LowZones.845
TR/Hijack.B Avira Trojan.LowZones.836
TR/Hijack.B Avira Trojan.LowZones.833
TR/Hijack.B Avira Trojan.LowZones.841
TR/Hijack.B Avira Trojan.LowZones.846
TR/Hijack.B Avira Trojan.LowZones.764
TR/Hijack.B Avira Trojan.LowZones.799
TR/Hijack.B Avira Trojan.LowZones.696
TR/Hijack.B Avira Trojan.LowZones.436
TR/Hijack.B Avira Trojan.LowZones.532
TR/Hijack.B Avira Trojan.LowZones.450
TR/Hijack.B Avira Trojan.LowZones.362
TR/Hijack.B Avira Trojan.LowZones.303
TR/Hijack.B Avira Trojan.LowZones.503
TR/Hijack.B Avira Trojan.LowZones.281
TR/Hijack.B Avira Trojan.LowZones.352
TR/Hijack.B Avira Trojan.LowZones.591
TR/Hijack.B Avira Trojan.LowZones.538
TR/Hijack.B Avira Trojan.LowZones.345
TR/Hijack.B Avira Trojan.LowZones.555
TR/Hijack.B Avira Trojan.LowZones.491
TR/Hijack.B Avira Trojan.LowZones.422
TR/Hijack.B Avira Trojan.LowZones.582
TR/Hijack.B Avira Trojan.LowZones.400
TR/Hijack.B Avira Trojan.LowZones.520
TR/Hijack.B Avira Trojan.LowZones.430
TR/Hijack.B Avira Trojan.LowZones.546
TR/Hijack.B Avira Trojan.LowZones.284
TR/Hijack.B Avira Trojan.LowZones.562
TR/Hijack.B Avira Trojan.LowZones.393
TR/Hijack.B Avira Trojan.LowZones.313
TR/Hijack.B Avira Trojan.LowZones.388
TR/Hijack.B Avira Trojan.LowZones.552
TR/Hijack.B Avira Trojan.LowZones.544
TR/Hijack.B Avira Trojan.LowZones.463
TR/Hijack.B Avira Trojan.LowZones.367
TR/Hijack.B Avira Trojan.LowZones.411
TR/Hijack.B Avira Trojan.LowZones.431
TR/Hijack.B Avira Trojan.LowZones.505
TR/Hijack.B Avira Trojan.LowZones.527
TR/Hijack.B Avira Trojan.LowZones.438
TR/Hijack.B Avira Trojan.LowZones.394
TR/Hijack.B Avira Trojan.LowZones.502
TR/Hijack.B Avira Trojan.LowZones.373
TR/Hijack.B Avira Trojan.LowZones.496
TR/Hijack.B Avira Trojan.LowZones.298

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.