Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Win32.Qhost.it aliases:

Name Vendor Dr.Web classification name
Trojan.Win32.Qhost.it VirusBlokAda Trojan.MulDrop.7764
Trojan.Win32.Qhost.it VirusBlokAda Trojan.MulDrop.7046
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2537
Trojan.Win32.Qhost.it Kaspersky Trojan.Qhost
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost
Trojan.Win32.Qhost.it Kaspersky Trojan.Spambot.2427
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2427
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Upload
Trojan.Win32.Qhost.it Kaspersky Trojan.Spambot.2519
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2519
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2510
Trojan.Win32.Qhost.it Kaspersky BackDoor.Weird.13
Trojan.Win32.Qhost.it VirusBlokAda BackDoor.Weird.13
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2477
Trojan.Win32.Qhost.it VirusBlokAda Trojan.MulDrop.9297
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2539
Trojan.Win32.Qhost.it Kaspersky Trojan.Spambot.2520
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2520
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2535
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2536
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45075
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45074
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Spambot.2542
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45256
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45242
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45279
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45340
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45337
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45387
Trojan.Win32.Qhost.it VirusBlokAda BackDoor.Weird.16
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45394
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45397
Trojan.Win32.Qhost.it Kaspersky BackDoor.Zena
Trojan.Win32.Qhost.it VirusBlokAda BackDoor.Zena
Trojan.Win32.Qhost.it Kaspersky Trojan.Qhost.126
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.45339
Trojan.Win32.Qhost.it Kaspersky BackDoor.Dsrv
Trojan.Win32.Qhost.it VirusBlokAda BackDoor.Dsrv
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.1372
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.1370
Trojan.Win32.Qhost.it Kaspersky Win32.Virut.5
Trojan.Win32.Qhost.it Kaspersky Trojan.Qhost.139
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.139
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.129
Trojan.Win32.Qhost.it Kaspersky Trojan.Qhost.127
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.127
Trojan.Win32.Qhost.it Kaspersky Trojan.Spambot.2782
Trojan.Win32.Qhost.it VirusBlokAda Trojan.PWS.Wsgame.3209
Trojan.Win32.Qhost.it Kaspersky Trojan.Qhost.1380
Trojan.Win32.Qhost.it VirusBlokAda Trojan.Qhost.1380

1 2 3 4 5 6 7 8 9

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.