Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-AWQ.b aliases:

Name Vendor Dr.Web classification name
BackDoor-AWQ.b McAfee BackDoor.Pigeon.57
BackDoor-AWQ.b McAfee BackDoor.Pigeon.9207
BackDoor-AWQ.b McAfee Trojan.MulDrop.3300
BackDoor-AWQ.b McAfee BackDoor.Qmulx
BackDoor-AWQ.b McAfee BackDoor.Pigeon.31
BackDoor-AWQ.b McAfee BackDoor.Pigeon.2769
BackDoor-AWQ.b McAfee BackDoor.BlackHole.2004
BackDoor-AWQ.b McAfee BackDoor.GDoor.31
BackDoor-AWQ.b McAfee BackDoor.Pigeon.32
BackDoor-AWQ.b McAfee BackDoor.Pigeon.1910
BackDoor-AWQ.b McAfee BackDoor.Pigeon.7877
BackDoor-AWQ.b McAfee BackDoor.Pigeon.11
BackDoor-AWQ.b McAfee Trojan.MulDrop.2115
BackDoor-AWQ.b McAfee Trojan.MulDrop.3009
BackDoor-AWQ.b McAfee BackDoor.Singu
BackDoor-AWQ.b McAfee BackDoor.Pigeon.12
BackDoor-AWQ.b McAfee BackDoor.Pigeon.9251
BackDoor-AWQ.b McAfee BackDoor.Pigeon.77
BackDoor-AWQ.b McAfee BackDoor.Pigeon.133
BackDoor-AWQ.b McAfee BackDoor.Pigeon.95
BackDoor-AWQ.b McAfee BackDoor.Pigeon.101
BackDoor-AWQ.b McAfee Trojan.PWS.QQGhost
BackDoor-AWQ.b McAfee Trojan.DownLoad.29377
BackDoor-AWQ.b McAfee BackDoor.Pigeon.23304
BackDoor-AWQ.b McAfee BackDoor.Pigeon.22378
BackDoor-AWQ.b McAfee Trojan.MulDrop.29894
BackDoor-AWQ.b McAfee Trojan.MulDrop.1863
BackDoor-AWQ.b McAfee Trojan.MulDrop.876
BackDoor-AWQ.b McAfee BackDoor.Huai.3391
BackDoor-AWQ.b McAfee Trojan.DownLoader.4404
BackDoor-AWQ.b McAfee Trojan.Webind
BackDoor-AWQ.b McAfee BackDoor.Pigeon.108
BackDoor-AWQ.b McAfee BackDoor.Pigeon.23281
BackDoor-AWQ.B McAfee BackDoor.Pigeon.9177
BackDoor-AWQ.b McAfee BackDoor.Pigeon.9
BackDoor-AWQ.b McAfee BackDoor.Pigeon.13
BackDoor-AWQ.b McAfee BackDoor.Pigeon.87
BackDoor-AWQ.b McAfee BackDoor.Pigeon.49
BackDoor-AWQ.b McAfee BackDoor.Pigeon.141
BackDoor-AWQ.b McAfee BackDoor.Pigeon.114
BackDoor-AWQ.b McAfee BackDoor.Pigeon.39
BackDoor-AWQ.b McAfee BackDoor.Pigeon.66
BackDoor-AWQ.b McAfee BackDoor.Pigeon.68
BackDoor-AWQ.b McAfee BackDoor.Pigeon.56
BackDoor-AWQ.b McAfee BackDoor.Vport.11
BackDoor-AWQ.b McAfee BackDoor.Pigeon.52
BackDoor-AWQ.b McAfee BackDoor.Pigeon.45
BackDoor-AWQ.b McAfee BackDoor.Gepion
BackDoor-AWQ.b McAfee BackDoor.Pigeon.15
BackDoor-AWQ.b McAfee BackDoor.Pigeon.70

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.