Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_STRAT.GEN-3 aliases:

Name Vendor Dr.Web classification name
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2249
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar
WORM_STRAT.GEN-3 Trend Micro Trojan.DownLoader.35477
WORM_STRAT.GEN-3 Trend Micro Trojan.DownLoader.42637
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Gamania.4544
WORM_STRAT.GEN-3 Trend Micro Trojan.Inject.1271
WORM_STRAT.GEN-3 Trend Micro Trojan.Inject.1673
WORM_STRAT.GEN-3 Trend Micro Trojan.Inject.549
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Gamania.3284
WORM_STRAT.GEN-3 Trend Micro Trojan.Swizzor.1470
WORM_STRAT.GEN-3 Trend Micro Trojan.Swizzor.1082
WORM_STRAT.GEN-3 Trend Micro Trojan.NtRootKit.348
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2292
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2308
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2288
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2309
WORM_STRAT.GEN-3 Trend Micro Trojan.MulDrop.8732
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1320
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.2910
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.2905
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2348
WORM_STRAT.GEN-3 Trend Micro Trojan.MulDrop.9287
WORM_STRAT.GEN-3 Trend Micro Trojan.NtRootKit.493
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.3360
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1051
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.3348
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2265
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2245
WORM_STRAT.GEN-3 Trend Micro Trojan.DownLoader.34838
WORM_STRAT.GEN-3 Trend Micro Trojan.DownLoader.33804
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1752
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1764
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1754
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.2996
WORM_STRAT.GEN-3 Trend Micro Trojan.KeyLogger.603
WORM_STRAT.GEN-3 Trend Micro BackDoor.Bulknet.187
WORM_STRAT.GEN-3 Trend Micro Trojan.Sentinel
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2244
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1285
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1206
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1284
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1251
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.1283
WORM_STRAT.GEN-3 Trend Micro Trojan.DownLoader.35480
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Poptang
WORM_STRAT.GEN-3 Trend Micro Trojan.DownLoader.35479
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Wsgame.3403
WORM_STRAT.GEN-3 Trend Micro Trojan.PWS.Gamania.7369
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2168
WORM_STRAT.GEN-3 Trend Micro Win32.HLLM.Limar.2281

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.