Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic Obfuscated.a aliases:

Name Vendor Dr.Web classification name
Generic Obfuscated.a McAfee BackDoor.Pigeon.5469
Generic Obfuscated.a McAfee BackDoor.Pigeon.1733
Generic Obfuscated.a McAfee BackDoor.BlackHole.2278
Generic Obfuscated.a McAfee BackDoor.Pigeon.4323
Generic Obfuscated.a McAfee BackDoor.Pigeon.3405
Generic Obfuscated.a McAfee BackDoor.Pigeon.8384
Generic Obfuscated.a McAfee BackDoor.Pigeon.8439
Generic Obfuscated.a McAfee BackDoor.Mybr
Generic Obfuscated.a McAfee Trojan.PWS.Qqpass.1921
Generic Obfuscated.a McAfee Trojan.Packed.152
Generic Obfuscated.a McAfee BackDoor.Pigeon.2918
Generic Obfuscated.a McAfee BackDoor.Pigeon.10576
Generic Obfuscated.a McAfee BackDoor.Pigeon.2663
Generic Obfuscated.a McAfee BackDoor.Pigeon.6374
Generic Obfuscated.a McAfee BackDoor.Pigeon.7558
Generic Obfuscated.a McAfee BackDoor.Pigeon.7479
Generic Obfuscated.a McAfee BackDoor.Huai.2459
Generic Obfuscated.a McAfee BackDoor.Pigeon.8260
Generic Obfuscated.a McAfee BackDoor.Pigeon.3922
Generic Obfuscated.a McAfee BackDoor.Pigeon.6367
Generic Obfuscated.a McAfee BackDoor.Pigeon.5552
Generic Obfuscated.a McAfee BackDoor.Huai.2419
Generic Obfuscated.a McAfee BackDoor.Huai.2057
Generic Obfuscated.a McAfee BackDoor.Huai.2551
Generic Obfuscated.a McAfee BackDoor.Pigeon.6204
Generic Obfuscated.a McAfee BackDoor.Pigeon.8460
Generic Obfuscated.a McAfee BackDoor.Pigeon.8638
Generic Obfuscated.a McAfee BackDoor.Pigeon.8731
Generic Obfuscated.a McAfee BackDoor.Pigeon.10139
Generic Obfuscated.a McAfee BackDoor.Pigeon.3471
Generic Obfuscated.a McAfee BackDoor.Pigeon.7765
Generic Obfuscated.a McAfee BackDoor.Pigeon.4899
Generic Obfuscated.a McAfee BackDoor.Pigeon.3297
Generic Obfuscated.a McAfee BackDoor.Pigeon.6930
Generic Obfuscated.a McAfee BackDoor.Pigeon.5545
Generic Obfuscated.a McAfee BackDoor.Pigeon.10812
Generic Obfuscated.a McAfee BackDoor.Pigeon.10953
Generic Obfuscated.a McAfee BackDoor.Pigeon.8664
Generic Obfuscated.a McAfee BackDoor.Pigeon.8691
Generic Obfuscated.a McAfee BackDoor.Pigeon.8682
Generic Obfuscated.a McAfee BackDoor.Pigeon.8643
Generic Obfuscated.a McAfee BackDoor.Pigeon.8599
Generic Obfuscated.a McAfee BackDoor.Pigeon.8670
Generic Obfuscated.a McAfee BackDoor.Pigeon.8475
Generic Obfuscated.a McAfee BackDoor.Pigeon.8694
Generic Obfuscated.a McAfee BackDoor.Pigeon.8656
Generic Obfuscated.a McAfee BackDoor.Pigeon.8582
Generic Obfuscated.a McAfee BackDoor.Pigeon.8556
Generic Obfuscated.a McAfee BackDoor.Pigeon.3569
Generic Obfuscated.a McAfee BackDoor.Pigeon.5119

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.