Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic Obfuscated.a aliases:

Name Vendor Dr.Web classification name
Generic Obfuscated.a McAfee BackDoor.Pigeon.8763
Generic Obfuscated.a McAfee BackDoor.Pigeon.8761
Generic Obfuscated.a McAfee BackDoor.Pigeon.8753
Generic Obfuscated.a McAfee BackDoor.Pigeon.8563
Generic Obfuscated.a McAfee BackDoor.Pigeon.8765
Generic Obfuscated.a McAfee BackDoor.Huai.1938
Generic Obfuscated.a McAfee BackDoor.Pigeon.8369
Generic Obfuscated.a McAfee BackDoor.Pigeon.3685
Generic Obfuscated.a McAfee BackDoor.Pigeon.11082
Generic Obfuscated.a McAfee BackDoor.Pigeon.3714
Generic Obfuscated.a McAfee BackDoor.Pigeon.4973
Generic Obfuscated.a McAfee BackDoor.Pigeon.11174
Generic Obfuscated.a McAfee BackDoor.Pigeon.1865
Generic Obfuscated.a McAfee BackDoor.Pigeon.9135
Generic Obfuscated.a McAfee BackDoor.Pigeon.8708
Generic Obfuscated.a McAfee BackDoor.Pigeon.8555
Generic Obfuscated.a McAfee BackDoor.Huai.1951
Generic Obfuscated.a McAfee BackDoor.Huai.2475
Generic Obfuscated.a McAfee Trojan.MulDrop.7144
Generic Obfuscated.a McAfee BackDoor.Pigeon.13074
Generic Obfuscated.a McAfee BackDoor.Pigeon.6247
Generic Obfuscated.a McAfee BackDoor.Pigeon.8746
Generic Obfuscated.a McAfee BackDoor.Pigeon.10300
Generic Obfuscated.a McAfee BackDoor.Cool
Generic Obfuscated.a McAfee BackDoor.Pigeon.6230
Generic Obfuscated.a McAfee BackDoor.Pigeon.7450
Generic Obfuscated.a McAfee BackDoor.Pigeon.2135
Generic Obfuscated.a McAfee BackDoor.Pigeon.1150
Generic Obfuscated.a McAfee BackDoor.Pigeon.6560
Generic Obfuscated.a McAfee BackDoor.Pigeon.4962
Generic Obfuscated.a McAfee BackDoor.Pigeon.11096
Generic Obfuscated.a McAfee BackDoor.Pigeon.11257
Generic Obfuscated.a McAfee BackDoor.Pigeon.3638
Generic Obfuscated.a McAfee Trojan.MulDrop.11519
Generic Obfuscated.a McAfee BackDoor.Pigeon.8512
Generic Obfuscated.a McAfee BackDoor.Pigeon.6015
Generic Obfuscated.a McAfee BackDoor.Huai.1424
Generic Obfuscated.a McAfee BackDoor.Huai.1407
Generic Obfuscated.a McAfee BackDoor.Pigeon.8441
Generic Obfuscated.a McAfee BackDoor.Pigeon.8270
Generic Obfuscated.a McAfee BackDoor.Pigeon.6540
Generic Obfuscated.a McAfee Trojan.PWS.LDPinch.1417
Generic Obfuscated.a McAfee BackDoor.Pigeon.3599
Generic Obfuscated.a McAfee BackDoor.Pigeon.1627
Generic Obfuscated.a McAfee BackDoor.Pigeon.3772
Generic Obfuscated.a McAfee BackDoor.Pigeon.6325
Generic Obfuscated.a McAfee Trojan.MulDrop.2774
Generic Obfuscated.a McAfee BackDoor.Pigeon.8273
Generic Obfuscated.a McAfee BackDoor.Huai.1933
Generic Obfuscated.a McAfee BackDoor.Pigeon.8286

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.