Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic Obfuscated.a aliases:

Name Vendor Dr.Web classification name
Generic Obfuscated.a McAfee BackDoor.Pigeon.3219
Generic Obfuscated.a McAfee BackDoor.Pigeon.6622
Generic Obfuscated.a McAfee BackDoor.Pigeon.6579
Generic Obfuscated.a McAfee BackDoor.Pigeon.5301
Generic Obfuscated.a McAfee BackDoor.Pigeon.9055
Generic Obfuscated.a McAfee BackDoor.Pigeon.3427
Generic Obfuscated.a McAfee BackDoor.Pigeon.2614
Generic Obfuscated.a McAfee BackDoor.Pigeon.8487
Generic Obfuscated.a McAfee BackDoor.Pigeon.14048
Generic Obfuscated.a McAfee BackDoor.BlackHole.2105
Generic Obfuscated.a McAfee BackDoor.Pigeon.8168
Generic Obfuscated.a McAfee BackDoor.Pigeon.12111
Generic Obfuscated.a McAfee BackDoor.Pigeon.5957
Generic Obfuscated.a McAfee BackDoor.Pigeon.2845
Generic Obfuscated.a McAfee BackDoor.Pigeon.6538
Generic Obfuscated.a McAfee BackDoor.Pigeon.5949
Generic Obfuscated.a McAfee BackDoor.Pigeon.6021
Generic Obfuscated.a McAfee BackDoor.Pigeon.5592
Generic Obfuscated.a McAfee BackDoor.Pigeon.5595
Generic Obfuscated.a McAfee BackDoor.Pigeon.11064
Generic Obfuscated.a McAfee BackDoor.Pigeon.10519
Generic Obfuscated.a McAfee BackDoor.Pigeon.6195
Generic Obfuscated.a McAfee Trojan.Peflog.148
Generic Obfuscated.a McAfee BackDoor.Pigeon.6356
Generic Obfuscated.a McAfee BackDoor.Pigeon.7373
Generic Obfuscated.a McAfee BackDoor.Pigeon.7407
Generic Obfuscated.a McAfee BackDoor.Pigeon.2727
Generic Obfuscated.a McAfee BackDoor.Pigeon.6643
Generic Obfuscated.a McAfee Trojan.DownLoader.51823
Generic Obfuscated.a McAfee BackDoor.Pigeon.11264
Generic Obfuscated.a McAfee BackDoor.Pigeon.5057
Generic Obfuscated.a McAfee BackDoor.Pigeon.5471
Generic Obfuscated.a McAfee BackDoor.Pigeon.3336
Generic Obfuscated.a McAfee BackDoor.Pigeon.5913
Generic Obfuscated.a McAfee BackDoor.Pigeon.803
Generic Obfuscated.a McAfee BackDoor.Pigeon.4855
Generic Obfuscated.a McAfee BackDoor.Huai.1733
Generic Obfuscated.a McAfee BackDoor.Pigeon.4936
Generic Obfuscated.a McAfee BackDoor.Pigeon.5462
Generic Obfuscated.a McAfee BackDoor.Bifrost.40
Generic Obfuscated.a McAfee BackDoor.Pigeon.22330
Generic Obfuscated.a McAfee BackDoor.Huai.1714
Generic Obfuscated.a McAfee BackDoor.Pigeon.3403
Generic Obfuscated.a McAfee BackDoor.Pigeon.3280
Generic Obfuscated.a McAfee BackDoor.Pigeon.4338
Generic Obfuscated.a McAfee BackDoor.Huai.1120
Generic Obfuscated.a McAfee BackDoor.Pigeon.8398
Generic Obfuscated.a McAfee BackDoor.Pigeon.9213
Generic Obfuscated.a McAfee BackDoor.Huai.5330
Generic Obfuscated.a McAfee BackDoor.Pigeon.10037

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.