Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-AWQ.svr.gen.e aliases:

Name Vendor Dr.Web classification name
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.6244
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.8391
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5204
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5102
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5036
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5268
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5065
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5296
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5396
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5062
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4801
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5297
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.9806
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.11579
BackDoor-AWQ.svr.gen.e McAfee Trojan.MulDrop.7138
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4802
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4961
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4952
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5111
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4589
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4901
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.3263
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5384
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.12932
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4981
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.8051
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4940
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4419
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4422
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5126
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4358
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4433
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4980
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.1266
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5186
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5168
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.5300
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.1567
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.1816
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.1814
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.2185
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.267
BackDoor-AWQ.svr.gen.e McAfee Trojan.PWS.Vipgsm
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.4677
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.1021
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.6308
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.6377
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.8270
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.2969
BackDoor-AWQ.svr.gen.e McAfee BackDoor.Pigeon.2945

1 2 3 4 5 6 7 8 9

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.