Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Conhook.Y aliases:

Name Vendor Dr.Web classification name
Trojan.Conhook.Y BitDefender Trojan.Click.3333
Trojan.Conhook.Y BitDefender Trojan.DownLoader.28160
Trojan.Conhook.Y BitDefender Trojan.Kvoes
Trojan.Conhook.Y BitDefender Trojan.Click.3338
Trojan.Conhook.Y BitDefender Trojan.Sentinel
Trojan.Conhook.Y BitDefender Trojan.Click.3620
Trojan.Conhook.Y BitDefender Trojan.Click.3619
Trojan.Conhook.Y BitDefender Trojan.Redir
Trojan.Conhook.Y BitDefender Trojan.PWS.GoldSpy
Trojan.Conhook.Y BitDefender Adware.Crew
Trojan.Conhook.Y BitDefender Trojan.Click.4052
Trojan.Conhook.Y BitDefender Trojan.Click.4054
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8468
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8465
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8456
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8451
Trojan.Conhook.Y BitDefender Trojan.Click.16673
Trojan.Conhook.Y BitDefender Trojan.Click.16737
Trojan.Conhook.Y BitDefender Trojan.Click.16628
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8872
Trojan.Conhook.Y BitDefender Trojan.Click.16698
Trojan.Conhook.Y BitDefender BackDoor.Roam
Trojan.Conhook.Y BitDefender Trojan.Hoster
Trojan.Conhook.Y BitDefender Trojan.DownLoader.36586
Trojan.Conhook.Y BitDefender BackDoor.Iterator
Trojan.Conhook.Y BitDefender Trojan.Click.17993
Trojan.Conhook.Y BitDefender Trojan.Click.17994
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8688
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8687
Trojan.Conhook.Y BitDefender Trojan.Click.17999
Trojan.Conhook.Y BitDefender Trojan.Click.17055
Trojan.Conhook.Y BitDefender Trojan.MulDrop.8444
Trojan.Conhook.Y BitDefender Trojan.Iho.2
Trojan.Conhook.Y BitDefender Trojan.Click.17986
Trojan.Conhook.Y BitDefender Trojan.Click.18014
Trojan.Conhook.Y BitDefender Trojan.DownLoader.26871
Trojan.Conhook.Y BitDefender Trojan.Starter.252
Trojan.Conhook.Y BitDefender Trojan.Hoster.213
Trojan.Conhook.Y BitDefender Trojan.Click.3185
Trojan.Conhook.Y BitDefender Trojan.Click.3169
Trojan.Conhook.Y BitDefender Trojan.Click.3331
Trojan.Conhook.Y BitDefender Trojan.Iespy
Trojan.Conhook.Y BitDefender Trojan.Click.18021
Trojan.Conhook.Y BitDefender Trojan.DownLoader.43105
Trojan.Conhook.Y BitDefender Trojan.Click.17996
Trojan.Conhook.Y BitDefender Trojan.DownLoader.origin
Trojan.Conhook.Y BitDefender Trojan.Click.45774

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies