FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Legmir.318 16.02.2006 --- Show
Trojan.PWS.Legmir.319 16.02.2006 --- Show
Trojan.PWS.Legmir.32 16.02.2006 --- Show
Trojan.PWS.Legmir.320 16.02.2006 --- Show
Trojan.PWS.Legmir.321 16.02.2006 --- Show
Trojan.PWS.Legmir.322 16.02.2006 --- Show
Trojan.PWS.Legmir.323 16.02.2006 --- Show
Trojan.PWS.Legmir.326 16.02.2006 --- Show
Trojan.PWS.Legmir.327 16.02.2006 --- Show
Trojan.PWS.Legmir.328 16.02.2006 --- Show
Trojan.PWS.Legmir.329 16.02.2006 --- Show
Trojan.PWS.Legmir.330 16.02.2006 --- Show
Trojan.PWS.Legmir.331 16.02.2006 --- Show
Trojan.PWS.Legmir.332 16.02.2006 --- Show
Trojan.PWS.Legmir.333 16.02.2006 --- Show
Trojan.PWS.Legmir.334 16.02.2006 --- Show
Trojan.PWS.Legmir.335 16.02.2006 --- Show
Trojan.PWS.Legmir.337 16.02.2006 --- Show
Trojan.PWS.Legmir.339 16.02.2006 --- Show
Trojan.PWS.Legmir.34 16.02.2006 --- Show
Trojan.PWS.Legmir.340 16.02.2006 --- Show
Trojan.PWS.Legmir.341 16.02.2006 --- Show
Trojan.PWS.Legmir.342 16.02.2006 --- Show
Trojan.PWS.Legmir.344 16.02.2006 --- Show
Trojan.PWS.Legmir.345 16.02.2006 --- Show
Trojan.PWS.Legmir.346 16.02.2006 --- Show
Trojan.PWS.Legmir.347 16.02.2006 --- Show
Trojan.PWS.Legmir.348 16.02.2006 --- Show
Trojan.PWS.Legmir.35 16.02.2006 --- Show
Trojan.PWS.Legmir.351 16.02.2006 --- Show
Trojan.PWS.Legmir.352 16.02.2006 --- Show
Trojan.PWS.Legmir.353 16.02.2006 --- Show
Trojan.PWS.Legmir.354 16.02.2006 --- Show
Trojan.PWS.Legmir.355 16.02.2006 --- Show
Trojan.PWS.Legmir.356 16.02.2006 --- Show
Trojan.PWS.Legmir.357 16.02.2006 --- Show
Trojan.PWS.Legmir.358 16.02.2006 --- Show
Trojan.PWS.Legmir.359 16.02.2006 --- Show
Trojan.PWS.Legmir.360 16.02.2006 --- Show
Trojan.PWS.Legmir.362 16.02.2006 --- Show
Trojan.PWS.Legmir.363 16.02.2006 --- Show
Trojan.PWS.Legmir.364 16.02.2006 --- Show
Trojan.PWS.Legmir.365 16.02.2006 --- Show
Trojan.PWS.Legmir.367 16.02.2006 --- Show
Trojan.PWS.Legmir.368 16.02.2006 --- Show
Trojan.PWS.Legmir.369 16.02.2006 --- Show
Trojan.PWS.Legmir.37 16.02.2006 --- Show
Trojan.PWS.Legmir.370 16.02.2006 --- Show
Trojan.PWS.Legmir.371 16.02.2006 --- Show
Trojan.PWS.Legmir.372 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies