Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-AWQ aliases:

Name Vendor Dr.Web classification name
BackDoor-AWQ McAfee BackDoor.Pigeon.2641
BackDoor-AWQ McAfee BackDoor.Pigeon.2374
BackDoor-AWQ McAfee BackDoor.Kais
BackDoor-AWQ McAfee BackDoor.Pigeon.2701
BackDoor-AWQ McAfee BackDoor.Pigeon.2367
BackDoor-AWQ McAfee BackDoor.Pigeon.2357
BackDoor-AWQ McAfee BackDoor.Pigeon.2564
BackDoor-AWQ McAfee BackDoor.Pigeon.11870
BackDoor-AWQ McAfee BackDoor.Pigeon.2602
BackDoor-AWQ McAfee BackDoor.Pigeon.239
BackDoor-AWQ McAfee BackDoor.Pigeon.2621
BackDoor-AWQ McAfee BackDoor.Pigeon.2606
BackDoor-AWQ McAfee BackDoor.Pigeon.3295
BackDoor-AWQ McAfee BackDoor.Pigeon.3285
BackDoor-AWQ McAfee BackDoor.Pigeon.2954
BackDoor-AWQ McAfee BackDoor.Pigeon.3151
BackDoor-AWQ McAfee BackDoor.Pigeon.3039
BackDoor-AWQ McAfee BackDoor.Pigeon.2961
BackDoor-AWQ McAfee BackDoor.Pigeon.2576
BackDoor-AWQ McAfee BackDoor.Pigeon.11392
BackDoor-AWQ McAfee BackDoor.Pigeon.1216
BackDoor-AWQ McAfee BackDoor.Pigeon.3048
BackDoor-AWQ McAfee BackDoor.Pigeon.8319
BackDoor-AWQ McAfee BackDoor.Pigeon.3026
BackDoor-AWQ McAfee BackDoor.Pigeon.2983
BackDoor-AWQ McAfee BackDoor.Pigeon.2909
BackDoor-AWQ McAfee BackDoor.Pigeon.4310
BackDoor-AWQ McAfee BackDoor.Pigeon.2989
BackDoor-AWQ McAfee BackDoor.Pigeon.2990
BackDoor-AWQ McAfee BackDoor.Pigeon.3012
BackDoor-AWQ McAfee BackDoor.Pigeon.2932
BackDoor-AWQ McAfee BackDoor.Pigeon.4316
BackDoor-AWQ McAfee BackDoor.Pigeon.2991
BackDoor-AWQ McAfee BackDoor.Pigeon.859
BackDoor-AWQ McAfee BackDoor.Pigeon.3067
BackDoor-AWQ McAfee BackDoor.Pigeon.4312
BackDoor-AWQ McAfee BackDoor.Pigeon.3180
BackDoor-AWQ McAfee BackDoor.Pigeon.2907
BackDoor-AWQ McAfee BackDoor.Pigeon.2696
BackDoor-AWQ McAfee BackDoor.Pigeon.8393
BackDoor-AWQ McAfee BackDoor.Pigeon.3165
BackDoor-AWQ McAfee BackDoor.Pigeon.4871
BackDoor-AWQ McAfee BackDoor.Pigeon.2202
BackDoor-AWQ McAfee BackDoor.Pigeon.3264
BackDoor-AWQ McAfee BackDoor.Pigeon.2254
BackDoor-AWQ McAfee BackDoor.Pigeon.3030
BackDoor-AWQ McAfee BackDoor.Pigeon.3037
BackDoor-AWQ McAfee BackDoor.Pigeon.3287
BackDoor-AWQ McAfee BackDoor.Pigeon.3040
BackDoor-AWQ McAfee BackDoor.Pigeon.3047

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.