Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_LAMEWAR.VTG aliases:

Name Vendor Dr.Web classification name
TROJ_LAMEWAR.VTG Trend Micro Win32.HLLW.Facebook.754
TROJ_LAMEWAR.VTG Trend Micro Win32.HLLW.Autohit.12190
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.41675
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad2.15050
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.41678
TROJ_LAMEWAR.VTG Trend Micro Trojan.Siggen2.231
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad2.15058
TROJ_LAMEWAR.VTG Trend Micro Trojan.Siggen2.525
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.41852
TROJ_LAMEWAR.VTG Trend Micro Trojan.Siggen2.556
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad1.64298
TROJ_LAMEWAR.VTG Trend Micro Trojan.Fakealert.18633
TROJ_LAMEWAR.VTG Trend Micro Trojan.Fakealert.18654
TROJ_LAMEWAR.VTG Trend Micro Win32.HLLW.Autoruner.26149
TROJ_LAMEWAR.VTG Trend Micro Win32.HLLW.Autohit.12389
TROJ_LAMEWAR.VTG Trend Micro Win32.HLLW.Autohit.12406
TROJ_LAMEWAR.VTG Trend Micro Trojan.KillProc.1629
TROJ_LAMEWAR.VTG Trend Micro Trojan.NtRootKit.9004
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad2.8802
TROJ_LAMEWAR.VTG Trend Micro Trojan.Siggen1.36282
TROJ_LAMEWAR.VTG Trend Micro Trojan.Fakealert.15985
TROJ_LAMEWAR.VTG Trend Micro Trojan.Packed.20819
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop.54863
TROJ_LAMEWAR.VTG Trend Micro Trojan.Packed.20876
TROJ_LAMEWAR.VTG Trend Micro Trojan.Siggen.64484
TROJ_LAMEWAR.VTG Trend Micro Exploit.Java.105
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.25467
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.27238
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad2.11224
TROJ_LAMEWAR.VTG Trend Micro Adware.Siggen.120
TROJ_LAMEWAR.VTG Trend Micro BackDoor.Siggen.24866
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.42262
TROJ_LAMEWAR.VTG Trend Micro Trojan.Click1.25285
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.27691
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop1.27717
TROJ_LAMEWAR.VTG Trend Micro Trojan.KillProc.1597
TROJ_LAMEWAR.VTG Trend Micro BackDoor.IRC.Sdbot.945
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad.51697
TROJ_LAMEWAR.VTG Trend Micro Trojan.MailSpy.486
TROJ_LAMEWAR.VTG Trend Micro Trojan.Virtumod.1947
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad1.13563
TROJ_LAMEWAR.VTG Trend Micro Trojan.MulDrop.41199
TROJ_LAMEWAR.VTG Trend Micro Exploit.SWF.143
TROJ_LAMEWAR.VTG Trend Micro Trojan.PWS.Stealer.258
TROJ_LAMEWAR.VTG Trend Micro Trojan.DownLoad1.9715
TROJ_LAMEWAR.VTG Trend Micro BackDoor.IRC.Bot.510
TROJ_LAMEWAR.VTG Trend Micro Win32.HLLW.Autoruner.25094
TROJ_LAMEWAR.VTG Trend Micro Trojan.PWS.Wsgame.14665
TROJ_LAMEWAR.VTG Trend Micro Trojan.Siggen2.5932
TROJ_LAMEWAR.VTG Trend Micro Trojan.PWS.Banker.32703

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.