Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWS-LegMir aliases:

Name Vendor Dr.Web classification name
PWS-Legmir McAfee Trojan.PWS.Xinkey
PWS-LegMir McAfee BackDoor.Generic.734
PWS-LegMir McAfee Trojan.PWS.Legmir.168
PWS-LegMir McAfee Trojan.PWS.Legmir.273
PWS-LegMir McAfee Trojan.PWS.Legmir.355
PWS-LegMir McAfee Trojan.PWS.Legmir.276
PWS-LegMir McAfee Trojan.PWS.Legmir.43
PWS-LegMir McAfee Trojan.PWS.Legmir.39
PWS-LegMir McAfee Trojan.PWS.Legmir.278
PWS-LegMir McAfee Trojan.PWS.Legmir.178
PWS-LegMir McAfee Trojan.PWS.Legmir.187
PWS-Legmir McAfee Trojan.PWS.Legmir.281
PWS-LegMir McAfee Trojan.PWS.Legmir.281
PWS-LegMir McAfee Trojan.PWS.Legmir.303
PWS-LegMir McAfee Trojan.PWS.Legmir.307
PWS-LegMir McAfee Trojan.PWS.Legmir.357
PWS-LegMir McAfee Trojan.PWS.Hiddu
PWS-LegMir McAfee Trojan.PWS.Legmir.260
PWS-LegMir McAfee Trojan.PWS.Legmir.46
PWS-LegMir McAfee Trojan.DownLoader.404
PWS-LegMir McAfee BackDoor.Generic.695
PWS-LegMir McAfee Trojan.PWS.Legmir.437
PWS-LegMir McAfee Trojan.PWS.Legmir.302
PWS-LegMir McAfee Trojan.PWS.Qover
PWS-LegMir McAfee Trojan.PWS.Mtmpass
PWS-LegMir McAfee Trojan.PWS.Legmir.305
PWS-Legmir McAfee Trojan.PWS.Legmir.306
PWS-LegMir McAfee Trojan.PWS.Legmir.354
PWS-LegMir McAfee Trojan.PWS.Legmir.255
PWS-LegMir McAfee Trojan.PWS.Legmir.183
PWS-LegMir McAfee Trojan.PWS.Legmir.182
PWS-Legmir McAfee Trojan.PWS.Legmir.276
PWS-LegMir McAfee Trojan.PWS.Legmir.235
PWS-LegMir McAfee Trojan.PWS.Legmir.247
PWS-LegMir McAfee Trojan.PWS.Mu
PWS-LegMir McAfee Trojan.PWS.Legmir.221
PWS-LegMir McAfee Trojan.PWS.Legmir.186
PWS-LegMir McAfee Trojan.PWS.Legmir.271
PWS-LegMir McAfee Trojan.PWS.Legmir.106
PWS-LegMir McAfee Trojan.PWS.Legmir.220
PWS-LegMir McAfee Trojan.PWS.Legmir.188
PWS-LegMir McAfee Trojan.PWS.Legmir.164
PWS-LegMir McAfee Trojan.PWS.Legmir.222
PWS-LegMir McAfee Trojan.PWS.Legmir.226
PWS-LegMir McAfee Trojan.PWS.Legmir.217
PWS-LegMir McAfee Trojan.PWS.Legmir.228
PWS-LegMir McAfee Trojan.PWS.Legmir.348
PWS-Legmir McAfee Trojan.MulDrop.2615
PWS-LegMir McAfee Trojan.PWS.Legmir.280
PWS-LegMir McAfee Trojan.PWS.Legmir.304

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.