FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Legmir.433 16.02.2006 --- Show
Trojan.PWS.Legmir.434 16.02.2006 --- Show
Trojan.PWS.Legmir.435 16.02.2006 --- Show
Trojan.PWS.Legmir.436 16.02.2006 --- Show
Trojan.PWS.Legmir.437 16.02.2006 --- Show
Trojan.PWS.Legmir.438 16.02.2006 --- Show
Trojan.PWS.Legmir.440 16.02.2006 --- Show
Trojan.PWS.Legmir.446 16.02.2006 --- Show
Trojan.PWS.Legmir.447 16.02.2006 --- Show
Trojan.PWS.Legmir.448 16.02.2006 --- Show
Trojan.PWS.Legmir.449 16.02.2006 --- Show
Trojan.PWS.Legmir.45 16.02.2006 --- Show
Trojan.PWS.Legmir.450 16.02.2006 --- Show
Trojan.PWS.Legmir.451 16.02.2006 --- Show
Trojan.PWS.Legmir.452 16.02.2006 --- Show
Trojan.PWS.Legmir.453 16.02.2006 --- Show
Trojan.PWS.Legmir.454 16.02.2006 --- Show
Trojan.PWS.Legmir.455 16.02.2006 --- Show
Trojan.PWS.Legmir.456 16.02.2006 --- Show
Trojan.PWS.Legmir.457 16.02.2006 --- Show
Trojan.PWS.Legmir.458 16.02.2006 --- Show
Trojan.PWS.Legmir.459 16.02.2006 --- Show
Trojan.PWS.Legmir.46 16.02.2006 --- Show
Trojan.PWS.Legmir.460 16.02.2006 --- Show
Trojan.PWS.Legmir.461 16.02.2006 --- Show
Trojan.PWS.Legmir.462 16.02.2006 --- Show
Trojan.PWS.Legmir.463 16.02.2006 --- Show
Trojan.PWS.Legmir.464 16.02.2006 --- Show
Trojan.PWS.Legmir.465 16.02.2006 --- Show
Trojan.PWS.Legmir.466 16.02.2006 --- Show
Trojan.PWS.Legmir.468 16.02.2006 --- Show
Trojan.PWS.Legmir.469 16.02.2006 --- Show
Trojan.PWS.Legmir.470 16.02.2006 --- Show
Trojan.PWS.Legmir.471 16.02.2006 --- Show
Trojan.PWS.Legmir.472 16.02.2006 --- Show
Trojan.PWS.Legmir.473 16.02.2006 --- Show
Trojan.PWS.Legmir.474 16.02.2006 --- Show
Trojan.PWS.Legmir.478 16.02.2006 --- Show
Trojan.PWS.Legmir.479 16.02.2006 --- Show
Trojan.PWS.Legmir.48 16.02.2006 --- Show
Trojan.PWS.Legmir.480 16.02.2006 --- Show
Trojan.PWS.Legmir.481 16.02.2006 --- Show
Trojan.PWS.Legmir.482 16.02.2006 --- Show
Trojan.PWS.Legmir.483 16.02.2006 --- Show
Trojan.PWS.Legmir.49 16.02.2006 --- Show
Trojan.PWS.Legmir.50 16.02.2006 --- Show
Trojan.PWS.Legmir.51 16.02.2006 --- Show
Trojan.PWS.Legmir.52 16.02.2006 --- Show
Trojan.PWS.Lendis 16.02.2006 --- Show
Trojan.PWS.Lenmir.12 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies