Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_MLWR-5 aliases:

Name Vendor Dr.Web classification name
Possible_MLWR-5 Trend Micro Trojan.PWS.Zhengtu
Possible_MLWR-5 Trend Micro Trojan.Click.2313
Possible_MLWR-5 Trend Micro Trojan.Popwin
Possible_MLWR-5 Trend Micro Trojan.PWS.Lineage
Possible_MLWR-5 Trend Micro Trojan.PWS.Wsgame
Possible_MLWR-5 Trend Micro Win32.HLLW.Autoruner
Possible_MLWR-5 Trend Micro Trojan.Vanti
Possible_MLWR-5 Trend Micro Trojan.PWS.Qqpass.821
Possible_MLWR-5 Trend Micro Trojan.DownLoader.13879
Possible_MLWR-5 Trend Micro Trojan.PWS.Gamania
Possible_MLWR-5 Trend Micro BackDoor.Pomax
Possible_MLWR-5 Trend Micro BackDoor.Rpcs
Possible_MLWR-5 Trend Micro Trojan.DownLoader.12452
Possible_MLWR-5 Trend Micro BackDoor.Pigeon.775
Possible_MLWR-5 Trend Micro Trojan.DownLoader.23165
Possible_MLWR-5 Trend Micro BackDoor.Klj
Possible_MLWR-5 Trend Micro Trojan.DownLoader.24037
Possible_MLWR-5 Trend Micro Trojan.Havedo
Possible_MLWR-5 Trend Micro Trojan.Cipher
Possible_MLWR-5 Trend Micro Trojan.PWS.Maran
Possible_MLWR-5 Trend Micro Trojan.PWS.Poptang
Possible_MLWR-5 Trend Micro Trojan.PWS.Vipgsm
Possible_MLWR-5 Trend Micro BackDoor.Pigeon.507
Possible_MLWR-5 Trend Micro Trojan.Click.1956
Possible_MLWR-5 Trend Micro Trojan.PWS.Tencent
Possible_MLWR-5 Trend Micro Trojan.MulDrop.5969
Possible_MLWR-5 Trend Micro Trojan.MulDrop.7050
Possible_MLWR-5 Trend Micro Trojan.Popwin.600
Possible_MLWR-5 Trend Micro Trojan.Click.3182
Possible_MLWR-5 Trend Micro Trojan.Popwin.602
Possible_MLWR-5 Trend Micro Win32.HLLW.Autoruner.186
Possible_MLWR-5 Trend Micro Win32.HLLW.Gavir.54
Possible_MLWR-5 Trend Micro Trojan.Popwin.601
Possible_MLWR-5 Trend Micro BackDoor.Indy.19
Possible_MLWR-5 Trend Micro Trojan.PWS.Gamania.2437
Possible_MLWR-5 Trend Micro Trojan.MulDrop.8022
Possible_MLWR-5 Trend Micro Trojan.DownLoader.28131
Possible_MLWR-5 Trend Micro Trojan.DownLoader.28602
Possible_MLWR-5 Trend Micro Win32.HLLW.Autoruner.297
Possible_MLWR-5 Trend Micro Trojan.Nsanti.Packed
Possible_MLWR-5 Trend Micro Trojan.Addurl
Possible_MLWR-5 Trend Micro BackDoor.Pigeon.1562
Possible_MLWR-5 Trend Micro BackDoor.IRC.Shabot
Possible_MLWR-5 Trend Micro Trojan.Click.3534
Possible_MLWR-5 Trend Micro Trojan.Click.3592
Possible_MLWR-5 Trend Micro DDoS.Bonke
Possible_MLWR-5 Trend Micro Adware.Baidu
Possible_MLWR-5 Trend Micro Win32.HLLW.Autoruner.347
Possible_MLWR-5 Trend Micro Win32.HLLW.Autoruner.346
Possible_MLWR-5 Trend Micro Trojan.DownLoader.29750

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.