Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-AWQ.svr.gen.a aliases:

Name Vendor Dr.Web classification name
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.857
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.975
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.1719
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.11604
BackDoor-AWQ.svr.gen.a McAfee BackDoor.IRC.Sdbot.1881
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.5057
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.2699
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.2638
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.2563
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.2346
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.2627
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.3042
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.3055
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.3023
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.3150
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.5
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.9159
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.33
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.7169
BackDoor-AWQ.svr.gen.a McAfee Trojan.MulDrop.13922
BackDoor-AWQ.svr.gen.a McAfee Trojan.MulDrop.5786
BackDoor-AWQ.svr.gen.a McAfee BackDoor.IRC.Sdbot.2873
BackDoor-AWQ.svr.gen.a McAfee BackDoor.IRC.Sdbot.2425
BackDoor-AWQ.svr.gen.a McAfee BackDoor.IRC.Sdbot.2755
BackDoor-AWQ.svr.gen.a McAfee BackDoor.IRC.Sdbot.2954
BackDoor-AWQ.svr.gen.a McAfee BackDoor.IRC.Sdbot.2793
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.223
BackDoor-AWQ.svr.gen.a McAfee BackDoor.IRC.Sdbot.2791
BackDoor-AWQ.svr.gen.a McAfee Trojan.DownLoader.35885
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.7769
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.9768
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.1946
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.8793
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.647
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.1746
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.2110
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.669
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.790
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.772
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.8195
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.1152
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4689
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4657
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4752
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4665
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4697
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4731
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4759
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4726
BackDoor-AWQ.svr.gen.a McAfee BackDoor.Pigeon.4732

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.