Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-AWQ aliases:

Name Vendor Dr.Web classification name
BackDoor-AWQ McAfee BackDoor.Pigeon.11537
BackDoor-AWQ McAfee BackDoor.BlackHole.2331
BackDoor-AWQ McAfee BackDoor.Huai.2796
BackDoor-AWQ McAfee BackDoor.Pigeon.20556
BackDoor-AWQ McAfee Trojan.MulDrop.13981
BackDoor-AWQ McAfee BackDoor.Pigeon.12263
BackDoor-AWQ McAfee BackDoor.Pigeon.11929
BackDoor-AWQ McAfee Trojan.MulDrop.4111
BackDoor-AWQ McAfee BackDoor.Pigeon.11894
BackDoor-AWQ McAfee BackDoor.Huai.2837
BackDoor-AWQ McAfee BackDoor.Pigeon.20542
BackDoor-AWQ McAfee BackDoor.Pigeon.2979
BackDoor-AWQ McAfee BackDoor.Pigeon.12262
BackDoor-AWQ McAfee BackDoor.Beizhu.979
BackDoor-AWQ McAfee BackDoor.Beizhu.610
BackDoor-AWQ McAfee BackDoor.Pigeon.12259
BackDoor-AWQ McAfee BackDoor.Pigeon.530
BackDoor-AWQ McAfee BackDoor.Pigeon.11913
BackDoor-AWQ McAfee BackDoor.Gupt
BackDoor-AWQ McAfee Trojan.MulDrop.14616
BackDoor-AWQ McAfee Trojan.MulDrop.14702
BackDoor-AWQ McAfee Trojan.MulDrop.14730
BackDoor-AWQ McAfee Trojan.DownLoader.38445
BackDoor-AWQ McAfee Trojan.Suicide
BackDoor-AWQ McAfee Trojan.PWS.Banker.20934
BackDoor-AWQ McAfee Trojan.MulDrop.16209
BackDoor-AWQ McAfee Trojan.Imp.6
BackDoor-AWQ McAfee Trojan.Click.18700
BackDoor-AWQ McAfee BackDoor.Pigeon.12465
BackDoor-AWQ McAfee BackDoor.Pigeon.12709
BackDoor-AWQ McAfee BackDoor.Pigeon.5402
BackDoor-AWQ McAfee BackDoor.Beizhu.1049
BackDoor-AWQ McAfee Win32.HLLW.Autoruner.2732
BackDoor-AWQ McAfee Trojan.PWS.Qqmail
BackDoor-AWQ McAfee Trojan.DownLoader.54335
BackDoor-AWQ McAfee DDoS.Rincux.133
BackDoor-AWQ McAfee Exploit.Ccproxy
BackDoor-AWQ McAfee BackDoor.Huai.2881
BackDoor-AWQ McAfee Trojan.Progress.13
BackDoor-AWQ McAfee BackDoor.Pigeon.2585
BackDoor-AWQ McAfee BackDoor.Pigeon.8238
BackDoor-AWQ McAfee BackDoor.Pigeon.11527
BackDoor-AWQ McAfee BackDoor.Pigeon.6493
BackDoor-AWQ McAfee Trojan.Packed.152
BackDoor-AWQ McAfee BackDoor.Klj.25
BackDoor-AWQ McAfee BackDoor.Huai.2712
BackDoor-AWQ McAfee BackDoor.Huai.2871
BackDoor-AWQ McAfee BackDoor.Pigeon.12092
BackDoor-AWQ McAfee BackDoor.Pigeon.12074
BackDoor-AWQ McAfee Trojan.DownLoader.26372

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.