Keyword: androidos_tcent.a
99645 Total Search   |   Showing Results : 281 - 300
This adware may be downloaded from app stores/third party app stores. It steals certain information from the system and/or the user. Arrival Details This adware may be downloaded from app
This spyware may be downloaded from app stores/third party app stores. Arrival Details This spyware may be downloaded from app stores/third party app stores. NOTES: This malware can hijack the power
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: This malware can use vulnerability
NOTES: Certain applications on Google Play pose as legitimate voice messenger platforms, with suspicious automated functions such as automatic pop-ups of fake surveys and fraudulent ad clicks. When
NOTES: This app includes an aggressive 3rd party SDK. The SDK gets user's personal information, such as location information and history bookmark, without user's awareness or authorization. It sends
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal. Installation This Trojan bears the file icons of the following applications: HGS Mobile
Mobile Malware Routine This Trojan bears the file icons of the following applications: AhnLab V3 Mobile Plus 2.0 It also steals the following information from the affected device: IMEI Phone Number
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
NOTES: This malicious app sends text messages without informing the user. In some samples, the message content may contain private information.
This Potentially Unwanted Application sends SMS messages to premium numbers, resulting in unwanted charges billed to you. Mobile Malware Routine This Potentially Unwanted Application sends text
This Trojan steals certain information from the system and/or the user. It sends SMS messages to premium numbers, resulting in unwanted charges billed to you. Information Theft This Trojan steals the
This Trojan is able to lock and wipe data in infected devices. It uses SMS message to receive the command.
This Android malware contains an ad fraud SDK. The creator developed this malware to mimic actual user behavior. It can create bot ad traffic and blend bot traffic with existing human traffic. The
This adware may be downloaded from app stores/third party app stores. Arrival Details This adware may be downloaded from app stores/third party app stores. NOTES: This malware is capable of: leaking
This backdoor gathers device information. It monitors all incoming and outgoing calls. Mobile Malware Routine This backdoor gathers the following device information: imei Wi-Fi MAC address cellphone
This is the Trend Micro detection for mobile vulnerabilities found in Android applications. Android OS defines the data storage zone for private or public access. This detection shows that sensitive