Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_Infostl aliases:

Name Vendor Dr.Web classification name
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.342
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.343
Possible_Infostl Trend Micro Trojan.PWS.Lineage
Possible_Infostl Trend Micro Trojan.PWS.Gamania
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.362
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.363
Possible_Infostl Trend Micro Trojan.PWS.Qqshou
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.364
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.366
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.367
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.369
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.370
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.371
Possible_Infostl Trend Micro Trojan.DownLoader.16606
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.373
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.375
Possible_Infostl Trend Micro Trojan.PWS.Wow
Possible_Infostl Trend Micro Trojan.MulDrop.4916
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.379
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.380
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.381
Possible_Infostl Trend Micro Trojan.MulDrop.4993
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.384
Possible_Infostl Trend Micro Trojan.PWS.Qqrobber.173
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.383
Possible_Infostl Trend Micro Trojan.Shua
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.389
Possible_Infostl Trend Micro Trojan.Heihei
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.391
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.186
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.392
Possible_Infostl Trend Micro Trojan.Cleaner
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.395
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.400
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.402
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.404
Possible_Infostl Trend Micro Trojan.DownLoader.14873
Possible_Infostl Trend Micro Trojan.DownLoader.17570
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.405
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.418
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.419
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.425
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.426
Possible_Infostl Trend Micro Trojan.DownLoader.18126
Possible_Infostl Trend Micro Trojan.DownLoader.18146
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.432
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.437
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.438
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.439
Possible_Infostl Trend Micro Trojan.PWS.Qqpass.443

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.