Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Stration@MM aliases:

Name Vendor Dr.Web classification name
W32/Stration@MM McAfee Trojan.DownLoader.12222
W32/Stration@MM McAfee Win32.HLLM.Limar
W32/Stration@MM McAfee Trojan.Limar
W32/Stration@MM McAfee Trojan.Opnis
W32/Stration@MM McAfee Trojan.Spambot
W32/Stration@MM McAfee Trojan.DownLoader.12434
W32/Stration@MM McAfee Win32.HLLM.Limar.based
W32/Stration@MM McAfee Trojan.Fakealert
W32/Stration@MM McAfee Win32.Virut.5
W32/Stration@MM McAfee Trojan.Proxy.2413
W32/Stration@MM McAfee Trojan.Proxy.2412
W32/Stration@MM McAfee Trojan.DownLoader.20772
W32/Stration@MM McAfee Trojan.PWS.Besq
W32/Stration@MM McAfee Win32.HLLM.Limar.2244
W32/Stration@MM McAfee Win32.HLLM.Limar.2168
W32/Stration@MM McAfee Win32.HLLM.Limar.2208
W32/Stration@MM McAfee Win32.HLLM.Limar.2182
W32/Stration@MM McAfee Win32.HLLM.Limar.2206
W32/Stration@MM McAfee Win32.HLLM.Limar.2214
W32/Stration@MM McAfee Win32.HLLM.Limar.2217
W32/Stration@MM McAfee Win32.HLLM.Limar.2189
W32/Stration@MM McAfee Win32.HLLM.Limar.2194
W32/Stration@MM McAfee Win32.HLLM.Limar.2216
W32/Stration@MM McAfee Win32.HLLM.Limar.2203
W32/Stration@MM McAfee Win32.HLLM.Limar.2437
W32/Stration@MM McAfee Win32.HLLM.Limar.2181
W32/Stration@MM McAfee Win32.HLLM.Limar.2209
W32/Stration@MM McAfee Win32.HLLM.Limar.2215
W32/Stration@MM McAfee Win32.HLLM.Limar.2207
W32/Stration@MM McAfee Win32.HLLM.Limar.2192
W32/Stration@MM McAfee Win32.HLLM.Limar.2212
W32/Stration@MM McAfee Win32.HLLM.Limar.2211
W32/Stration@MM McAfee Trojan.Spambot.2415
W32/Stration@MM McAfee Win32.HLLM.Limar.2178
W32/Stration@MM McAfee Win32.HLLM.Limar.2177
W32/Stration@MM McAfee Win32.HLLM.Limar.2174
W32/Stration@MM McAfee Win32.HLLM.Limar.2176
W32/Stration@MM McAfee Win32.HLLM.Limar.2259
W32/Stration@MM McAfee Win32.HLLM.Limar.2226
W32/Stration@MM McAfee Trojan.Chou
W32/Stration@MM McAfee Win32.HLLM.Limar.2357
W32/Stration@MM McAfee Win32.HLLM.Limar.2096
W32/Stration@MM McAfee Win32.HLLM.Limar.2094
W32/Stration@MM McAfee Exploit.DCom.190
W32/Stration@MM McAfee Win32.HLLM.Limar.2155
W32/Stration@MM McAfee Win32.HLLM.Limar.2143
W32/Stration@MM McAfee Win32.HLLM.Limar.2234
W32/Stration@MM McAfee Win32.HLLM.Limar.2219
W32/Stration@MM McAfee Win32.HLLM.Limar.2228
W32/Stration@MM McAfee Win32.HLLM.Limar.2224

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.