Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-AWQ aliases:

Name Vendor Dr.Web classification name
BackDoor-AWQ McAfee BackDoor.Pigeon.25015
BackDoor-AWQ McAfee BackDoor.Pigeon.12971
BackDoor-AWQ McAfee BackDoor.Pigeon.23193
BackDoor-AWQ McAfee BackDoor.Pigeon.23117
BackDoor-AWQ McAfee BackDoor.Pigeon.23132
BackDoor-AWQ McAfee BackDoor.Pigeon.23155
BackDoor-AWQ McAfee BackDoor.Pigeon.23198
BackDoor-AWQ McAfee BackDoor.Pigeon.23162
BackDoor-AWQ McAfee BackDoor.Pigeon.23190
BackDoor-AWQ McAfee BackDoor.Pigeon.9904
BackDoor-AWQ McAfee BackDoor.Huai.1101
BackDoor-AWQ McAfee BackDoor.Pigeon.2298
BackDoor-AWQ McAfee BackDoor.Pigeon.3790
BackDoor-AWQ McAfee BackDoor.Pigeon.4333
BackDoor-AWQ McAfee BackDoor.Pigeon.6650
BackDoor-AWQ McAfee Trojan.KeyLogger.719
BackDoor-AWQ McAfee BackDoor.Pigeon.6270
BackDoor-AWQ McAfee BackDoor.Pigeon.564
BackDoor-AWQ McAfee BackDoor.Pigeon.6420
BackDoor-AWQ McAfee BackDoor.Huai.577
BackDoor-AWQ McAfee Trojan.DownLoader.10622
BackDoor-AWQ McAfee BackDoor.Pigeon.5905
BackDoor-AWQ McAfee BackDoor.Pigeon.4577
BackDoor-AWQ McAfee BackDoor.Pigeon.8360
BackDoor-AWQ McAfee Trojan.PWS.Wsgame.18219
BackDoor-AWQ McAfee BackDoor.BlackHole.2303
BackDoor-AWQ McAfee BackDoor.Pigeon.24577
BackDoor-AWQ McAfee BackDoor.Pigeon.7226
BackDoor-AWQ McAfee BackDoor.Pigeon.6915
BackDoor-AWQ McAfee Trojan.DownLoad.36410
BackDoor-AWQ McAfee BackDoor.Terminal
BackDoor-AWQ McAfee BackDoor.Pigeon.6036
BackDoor-AWQ McAfee BackDoor.Pigeon.5369
BackDoor-AWQ McAfee BackDoor.Pigeon.5097
BackDoor-AWQ McAfee BackDoor.Pigeon.8688
BackDoor-AWQ McAfee BackDoor.Pigeon.2624
BackDoor-AWQ McAfee BackDoor.Pigeon.9561
BackDoor-AWQ McAfee BackDoor.Pigeon.24220
BackDoor-AWQ McAfee BackDoor.Pigeon.8990
BackDoor-AWQ McAfee BackDoor.Pigeon.7319
BackDoor-AWQ McAfee BackDoor.Pigeon.24837
BackDoor-AWQ McAfee BackDoor.Pigeon.1257
BackDoor-AWQ McAfee BackDoor.Pigeon.9143
BackDoor-AWQ McAfee BackDoor.Huai.2381
BackDoor-AWQ McAfee BackDoor.Pigeon.5011
BackDoor-AWQ McAfee BackDoor.Pigeon.3852
BackDoor-AWQ McAfee Trojan.Cipher.92
BackDoor-AWQ McAfee BackDoor.Pigeon.7042
BackDoor-AWQ McAfee BackDoor.Pigeon.7409
BackDoor-AWQ McAfee BackDoor.Pigeon.7379

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.