Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Possible_Movly-1 aliases:

Name Vendor Dr.Web classification name
Possible_Movly-1 Trend Micro Trojan.PWS.Wsgame.12116
Possible_Movly-1 Trend Micro Trojan.PWS.Wsgame.12114
Possible_Movly-1 Trend Micro Trojan.MulDrop.10783
Possible_Movly-1 Trend Micro Trojan.MulDrop.4989
Possible_Movly-1 Trend Micro Trojan.MulDrop.13810
Possible_Movly-1 Trend Micro Trojan.MulDrop.5419
Possible_Movly-1 Trend Micro Trojan.MulDrop.12690
Possible_Movly-1 Trend Micro Trojan.MulDrop.5822
Possible_Movly-1 Trend Micro Trojan.MulDrop.16000
Possible_Movly-1 Trend Micro Trojan.MulDrop.17658
Possible_Movly-1 Trend Micro Trojan.MulDrop.6209
Possible_Movly-1 Trend Micro Trojan.MulDrop.12689
Possible_Movly-1 Trend Micro Trojan.MulDrop.11738
Possible_Movly-1 Trend Micro Trojan.MulDrop.9012
Possible_Movly-1 Trend Micro Trojan.MulDrop.9517
Possible_Movly-1 Trend Micro Trojan.Inject.3700
Possible_Movly-1 Trend Micro Trojan.MulDrop.10959
Possible_Movly-1 Trend Micro Trojan.MulDrop.16480
Possible_Movly-1 Trend Micro Trojan.Click.2219
Possible_Movly-1 Trend Micro Trojan.Click.2101
Possible_Movly-1 Trend Micro Trojan.Click.2218
Possible_Movly-1 Trend Micro Trojan.Click.2107
Possible_Movly-1 Trend Micro Trojan.Starter.413
Possible_Movly-1 Trend Micro Trojan.Starter.412
Possible_Movly-1 Trend Micro Trojan.MulDrop.12686
Possible_Movly-1 Trend Micro Trojan.MulDrop.13795
Possible_Movly-1 Trend Micro Adware.Cinmus.515
Possible_Movly-1 Trend Micro Trojan.MulDrop.12681
Possible_Movly-1 Trend Micro Trojan.MulDrop.2764
Possible_Movly-1 Trend Micro Adware.Adlog
Possible_Movly-1 Trend Micro Trojan.MulDrop.12393
Possible_Movly-1 Trend Micro Trojan.PWS.Gamania.3729
Possible_Movly-1 Trend Micro Trojan.Rox
Possible_Movly-1 Trend Micro Win32.HLLP.Rox.6
Possible_Movly-1 Trend Micro Adware.Cinmus.108
Possible_Movly-1 Trend Micro Trojan.MulDrop.5757
Possible_Movly-1 Trend Micro Trojan.MulDrop.12435
Possible_Movly-1 Trend Micro Trojan.MulDrop.10243
Possible_Movly-1 Trend Micro Trojan.MulDrop.3955
Possible_Movly-1 Trend Micro Trojan.MulDrop.3880
Possible_Movly-1 Trend Micro Adware.Cinmus.403
Possible_Movly-1 Trend Micro Trojan.MulDrop.18122
Possible_Movly-1 Trend Micro Trojan.MulDrop.13371
Possible_Movly-1 Trend Micro Trojan.Spambot.2474
Possible_Movly-1 Trend Micro Trojan.MulDrop.13775
Possible_Movly-1 Trend Micro Trojan.MulDrop.433
Possible_Movly-1 Trend Micro Trojan.MulDrop.13774
Possible_Movly-1 Trend Micro Trojan.MulDrop.12128
Possible_Movly-1 Trend Micro Trojan.MulDrop.10896
Possible_Movly-1 Trend Micro Trojan.MulDrop.10883

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.